Analysis

  • max time kernel
    147s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 22:32

General

  • Target

    77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe

  • Size

    184KB

  • MD5

    77496d46929697d4372c127b68bbe3e0

  • SHA1

    73a1ca36a368c141cbf9eccae81b0da65a6bcc69

  • SHA256

    3a0ddefcba7ec30b7d803044730d66164108bdb7953197ed6a92938230d3b0d2

  • SHA512

    90cbe3e75a9a2c802260b2bf30a6fc876528c3307a1142d2343cf4182a8be0fa813f5baf40ce373134a758cd20c54a4c763f027a6043ecfb5ac90bf05d83d817

  • SSDEEP

    3072:inJkmDoR2WQUdj0NXErhpdfFLvMqJviuy:invomQj0UhjfFLEqJviu

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\77496d46929697d4372c127b68bbe3e0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31287.exe

    Filesize

    184KB

    MD5

    7aaffc9201675ee5ad9e8cdf5bb2f50a

    SHA1

    7e9182670d1abc1c2fbb7898ab0ad43f4c554f0f

    SHA256

    76590a98a890b85f35abb1e98fb5e5f146b7128cf257400242eb2e4c30bcb1e6

    SHA512

    81bbb7a1be4ab60473ae4ba4ddd665e2a9b30f15b59429a27cde626f35f29bb2711edf4e882de4d769b122d2d1d31da1333517ce7f0356bf680b329a2a37dab6