Malware Analysis Report

2025-08-10 21:40

Sample ID 240602-25r75aae3x
Target 7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe
SHA256 dca1fc7904152c90ce95da188a6f9921ec82cef197d94718ced5130bffad7a9a
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

dca1fc7904152c90ce95da188a6f9921ec82cef197d94718ced5130bffad7a9a

Threat Level: Likely benign

The file 7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe was found to be: Likely benign.

Malicious Activity Summary


Unsigned PE

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-02 23:10

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 23:10

Reported

2024-06-02 23:12

Platform

win7-20240508-en

Max time kernel

147s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\Unicorn-16843.exe

MD5 1e567afde38a46c6afd7c2f51997d57e
SHA1 fbf9d392e8153000d4df9fa50526807504297cf7
SHA256 0c6f354b344dd70efd0eba72508d939dbef6a8bc1cd4fe111fe4cded38e18155
SHA512 b70c36d37624e259c655de216aa5840d9555e7fc4fc75f8f1f06253a39d1ab0a9067d28b9932c106d68ed3a8fd997478ad8118b6862b4350a92a78e325cf178c

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 23:10

Reported

2024-06-02 23:12

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe"

Signatures

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\7e513996ffad4b12477d7811457dabb0_NeikiAnalytics.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 170.253.116.51.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\Unicorn-23565.exe

MD5 a0d7f1565baa0240bfb5a5de303f61ca
SHA1 319eece69f2e39397e8a1248ef55b7ff2c828c72
SHA256 c735150d9d6f078ae08433f6a5e0707d695524ab26063bfed5c4e217daea71fc
SHA512 3309e0d7991fd041b6df0b31da103a8990b05b269cef42ea771aef265600896e5cbb750aa528be098339927cb18a87b9497949612365c13bfd21208c897a6627