Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 09:31
Static task
static1
Behavioral task
behavioral1
Sample
4f443562d1b5feb0374463ceb408e070_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4f443562d1b5feb0374463ceb408e070_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4f443562d1b5feb0374463ceb408e070_NeikiAnalytics.exe
-
Size
184KB
-
MD5
4f443562d1b5feb0374463ceb408e070
-
SHA1
39020b84fbb7814d66007f6a00d9efbd7ce2a844
-
SHA256
ca2c354a5f2e8dc4e7f574f21944a2cb897c968f21fcb8ace7d6b4cc5f5b3b1f
-
SHA512
850737f1a8bfc5432a21e153fcf940b474616e9808464bac4678ba04145983db57881dcd22cc196af0e9543fac311d3c06173e4f164bd92dbe0fd3f0a7e219ee
-
SSDEEP
3072:6nJkmDoR2WQUdj0NXErhpdfjLvMqJviurnH:6nvomQj0UhjfjLEqJviur
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2256 4f443562d1b5feb0374463ceb408e070_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5195bee2796f9640ad3c025877ac172e3
SHA12ff2aee039d59582f61751b774ce01116487490c
SHA256ad988a6e626f10fa54f3ff045cfb368b57667304f1bf45f9c1b8f33ae4897a00
SHA512b0f02276ee61e577ebcaf7e811e51af211c2e4b1269564ddef91fa600f0a66921d3997994258e37a00ff134467c44d90650d1b0962713fe19dab24296c4e7d2b