Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2024, 05:04
Static task
static1
Behavioral task
behavioral1
Sample
3bf3187c16e3c7e681efa92309efe220_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3bf3187c16e3c7e681efa92309efe220_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3bf3187c16e3c7e681efa92309efe220_NeikiAnalytics.exe
-
Size
184KB
-
MD5
3bf3187c16e3c7e681efa92309efe220
-
SHA1
3f0fe289f6792a62fdd83b1ec9a6cea94582088a
-
SHA256
19bca0552142518f555c6e9b85265f18dd5797355fa0ffa33eb0ac362ae090ac
-
SHA512
ce391753e0124db277cffbcc597b9ab3b534edeca7ab8d3cd2cb3f95383780277cabd83141e91e587dd6d0dc38689cdadd8bc0028592f31f392df5c67e1ca330
-
SSDEEP
3072:6nJkmDoR2WQUdj0NXdrhpdfqLvMqJviurnH:6nvomQj0DhjfqLEqJviur
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2468 3bf3187c16e3c7e681efa92309efe220_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5f02a5bd9952a10e8bb17e82e958f415f
SHA12c5704c63acdca697efde97e2e61423d1616f302
SHA256a1ea75469fcce80deca70c284bf62c93b2147fcce1974eac32b5dab919c841a2
SHA51249cd800914ac6c49493e5f71dba4e57b77359f1d5027065531729e2d3fc247bb90e0ff485013754a71238c77a2721e150bd5485dcfd8bec8614397758874c4de