Analysis

  • max time kernel
    147s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 20:03

General

  • Target

    1530b94af1bb7309c9dc09b6bad84260_NeikiAnalytics.exe

  • Size

    184KB

  • MD5

    1530b94af1bb7309c9dc09b6bad84260

  • SHA1

    ea33d781e673bcbb22c5c0e7d3a4de6748c7cdd3

  • SHA256

    de3ef00b2fbbd5d044cb774f9bc376967fb1f32681319bad9cebe226189f715f

  • SHA512

    24899e368fd1572db596ef8236b8877966aedf206154463893b70fb6f438c486cbf5c333fc1faa5e7681d033c932a3a6c5dab0c8321f5b9aa806b3e270b6486b

  • SSDEEP

    3072:6nJk6DoR2WQUdj0NXErhpdfJLvMqJviurnH:6nromQj0UhjfJLEqJviur

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1530b94af1bb7309c9dc09b6bad84260_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1530b94af1bb7309c9dc09b6bad84260_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-40237.exe

    Filesize

    184KB

    MD5

    c75f8da265a5719162c0ee11d837f57a

    SHA1

    491e638f61e6317a01259b4fe2dfe661c028459c

    SHA256

    8c9d85a6344e7bbcd777eccc17917be3aababad452b666a7dee1a2b486af54a1

    SHA512

    13a45b27556026919c480809e87d1d345f342f83dded04bd1677c2b7d626d4b5a0eafb9bff2d07241b7af0b4b80d86c7454e4231049d4125e82f141011e3b54d