Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 02:07

General

  • Target

    229fe883f59d18b4535a2bee7c58b760_NeikiAnalytics.exe

  • Size

    184KB

  • MD5

    229fe883f59d18b4535a2bee7c58b760

  • SHA1

    e58fed8f2bbdfe64fb41303498bba4a61d052ee5

  • SHA256

    895ea1f65e2621813aaeee14347a3b9031641e898b920d0f5b5130fe5400e2f4

  • SHA512

    1f5b2441101912e3b4632c620d5c243d37999efa875ea51ff761ced9db4f844289a1c50a25aec52c2ac5ea4a12e2b63cdf0aa881c3be358abfec41157af49454

  • SSDEEP

    3072:6nJkmDoR2WQUdj3NXdrhpdf+LvMqJviurnH:6nvomQj3Dhjf+LEqJviur

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\229fe883f59d18b4535a2bee7c58b760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\229fe883f59d18b4535a2bee7c58b760_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2552

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52823.exe

    Filesize

    184KB

    MD5

    34583c4905ea34cb09791e9dc77f2fce

    SHA1

    157b554ac58e55621d699738b39dd4d44c4a8d2f

    SHA256

    1c9c5a9af02eb974e270414692c5a723982bd07ab04d1107f0537e87258a8274

    SHA512

    af28dfeb85d32ac82a3b9093bc3346ddf9917d5ea3fab68f258793b8ad37e1a7d83c24706acf3c3e0d43916b731d7a77d119a931af65c2521cc40816b3c92767