Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exe
-
Size
184KB
-
MD5
68fd8be496c419300e3a69261ad472c0
-
SHA1
04605353d9482baefc50ca11276072f8624c2fe2
-
SHA256
8aac8f90efdc43eea0b7cc6d04ddffcaea686903cf9989646934632e05c32afc
-
SHA512
011fc0a377c754dacbd743c7fc29a50bd4f59048d8d4cad629a71e9faf92e70a2c4a4434d2e1e13b44b2f34432807772bfa81e3a53c5aaf2cd0467789c58920e
-
SSDEEP
3072:6nJkmDoR2WQUdj0NXErhpdf5LvMqJviurnH:6nvomQj0Uhjf5LEqJviur
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exepid process 4728 68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\68fd8be496c419300e3a69261ad472c0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4292,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4028 /prefetch:81⤵PID:780
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD53640af353368c160ac3d83a070a12059
SHA1f3f8c278d1e1ca0baef6503186b96b6d501db742
SHA25623205afe63103166b584ac39d6195685cd9d64c921e2623e874f89905e2ddc05
SHA5129a4eb305e8f1332bd1a51341d79fd7dfaa4b2d9a424e94296f0533844640603eead7d127ef807fdc6627fca3c07146c8b832e9dc511d0d5d240afc08f5201a70