Analysis
-
max time kernel
147s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe
-
Size
184KB
-
MD5
77496d46929697d4372c127b68bbe3e0
-
SHA1
73a1ca36a368c141cbf9eccae81b0da65a6bcc69
-
SHA256
3a0ddefcba7ec30b7d803044730d66164108bdb7953197ed6a92938230d3b0d2
-
SHA512
90cbe3e75a9a2c802260b2bf30a6fc876528c3307a1142d2343cf4182a8be0fa813f5baf40ce373134a758cd20c54a4c763f027a6043ecfb5ac90bf05d83d817
-
SSDEEP
3072:inJkmDoR2WQUdj0NXErhpdfFLvMqJviuy:invomQj0UhjfFLEqJviu
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3192 77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD57aaffc9201675ee5ad9e8cdf5bb2f50a
SHA17e9182670d1abc1c2fbb7898ab0ad43f4c554f0f
SHA25676590a98a890b85f35abb1e98fb5e5f146b7128cf257400242eb2e4c30bcb1e6
SHA51281bbb7a1be4ab60473ae4ba4ddd665e2a9b30f15b59429a27cde626f35f29bb2711edf4e882de4d769b122d2d1d31da1333517ce7f0356bf680b329a2a37dab6