Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe
-
Size
184KB
-
MD5
7e513996ffad4b12477d7811457dabb0
-
SHA1
5806ffe9dda7edfa3debc0a6ac5e69c8c28ed2ee
-
SHA256
dca1fc7904152c90ce95da188a6f9921ec82cef197d94718ced5130bffad7a9a
-
SHA512
651dc21cba3acf4e4521b0109e00d36491c42d419e04463e4562d2de47cf183acf587bb9d6229fd03653abe0f135f8ddb2ba70229fac9262e0f65e214351a30f
-
SSDEEP
3072:inJkmDoR2WQUdj0NXErhpdfALvMqJviuy:invomQj0UhjfALEqJviu
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1708 7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5a0d7f1565baa0240bfb5a5de303f61ca
SHA1319eece69f2e39397e8a1248ef55b7ff2c828c72
SHA256c735150d9d6f078ae08433f6a5e0707d695524ab26063bfed5c4e217daea71fc
SHA5123309e0d7991fd041b6df0b31da103a8990b05b269cef42ea771aef265600896e5cbb750aa528be098339927cb18a87b9497949612365c13bfd21208c897a6627