Analysis
-
max time kernel
132s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 02:02
Behavioral task
behavioral1
Sample
60605bed9d4136e3dd99b88266864b90_NeikiAnalytics.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
60605bed9d4136e3dd99b88266864b90_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
60605bed9d4136e3dd99b88266864b90_NeikiAnalytics.exe
-
Size
3.5MB
-
MD5
60605bed9d4136e3dd99b88266864b90
-
SHA1
05177b3602e979e0fec072c9a78814d2d4a5766d
-
SHA256
29931a4b2ddf0348dfbe7f7cc4cd2d0e20257cfb87d4efd2b17ab5b83c27bf5e
-
SHA512
2ee3dca7498334079a7e747d959702d606600d469a43c411580c14309d2e9c9f3e8a995d2b926b0aaaab8777ac82fc37bd5b31b6eb4d899eb81b6ff799f2ebeb
-
SSDEEP
98304:zZJcn73lFUUCuuXiwl6xBpUt6wUa2YF9Ra:Y7fuZ6xPVr6F9s
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3744-0-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral2/memory/3744-1-0x0000000000400000-0x0000000000424000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3744 60605bed9d4136e3dd99b88266864b90_NeikiAnalytics.exe 3744 60605bed9d4136e3dd99b88266864b90_NeikiAnalytics.exe