Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 23:10

General

  • Target

    7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe

  • Size

    184KB

  • MD5

    7e513996ffad4b12477d7811457dabb0

  • SHA1

    5806ffe9dda7edfa3debc0a6ac5e69c8c28ed2ee

  • SHA256

    dca1fc7904152c90ce95da188a6f9921ec82cef197d94718ced5130bffad7a9a

  • SHA512

    651dc21cba3acf4e4521b0109e00d36491c42d419e04463e4562d2de47cf183acf587bb9d6229fd03653abe0f135f8ddb2ba70229fac9262e0f65e214351a30f

  • SSDEEP

    3072:inJkmDoR2WQUdj0NXErhpdfALvMqJviuy:invomQj0UhjfALEqJviu

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23565.exe

          Filesize

          184KB

          MD5

          a0d7f1565baa0240bfb5a5de303f61ca

          SHA1

          319eece69f2e39397e8a1248ef55b7ff2c828c72

          SHA256

          c735150d9d6f078ae08433f6a5e0707d695524ab26063bfed5c4e217daea71fc

          SHA512

          3309e0d7991fd041b6df0b31da103a8990b05b269cef42ea771aef265600896e5cbb750aa528be098339927cb18a87b9497949612365c13bfd21208c897a6627