Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 23:48

General

  • Target

    5b299ff86d09dd09cab4ed7b69d1bec0_NeikiAnalytics.exe

  • Size

    184KB

  • MD5

    5b299ff86d09dd09cab4ed7b69d1bec0

  • SHA1

    0d42dfa7b5bf8a920263d948d0becb5c22e9530a

  • SHA256

    d266d9006a6a10c929b911fa9b5e16860419446e586e2655e3f934388d4fa25f

  • SHA512

    3345ebf80007d823e3036067021faad9ad0a75d7c4ba4c53a061bfd70e24c6a415f3dd9a10aab4fa8ee328acedf5dd79a3e1dc08a8cec8ce48606eacfa1943d3

  • SSDEEP

    3072:inJkmDoR2WQUdj0NXErhpdf7LvMqJviuy:invomQj0Uhjf7LEqJviu

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b299ff86d09dd09cab4ed7b69d1bec0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5b299ff86d09dd09cab4ed7b69d1bec0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4816

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41202.exe

          Filesize

          184KB

          MD5

          ececc34a33b890aa84bf34d1b973401f

          SHA1

          6a92736d03a59ec5ea5f424ccc8a4f734640bf92

          SHA256

          98d59dd6621496ec31b420f0d956889532e9ec97117d308c87603288df1a8bf5

          SHA512

          34e2751a28d7f38f890d3f0414e9c96715662e7c7441a2e5b18121e7e58307abc0af5a9723c069d06a46e4864917e882bf0dad61418dcce05e14d68660fd94fe