Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 21:36

General

  • Target

    0727f27067131d306b7ad5b8a07fa590_NeikiAnalytics.exe

  • Size

    396KB

  • MD5

    0727f27067131d306b7ad5b8a07fa590

  • SHA1

    a1d5ede2678b895a2f387390fcc6d33267915e66

  • SHA256

    fe086c50462293b2fbd1b919c4d4991bde1f3ba29997ac4825258e9178922e59

  • SHA512

    2ee7be461182d4b555c47e8f62738b49a51a6efda04edaba60d4cc2dba463b27ed59ad6418bc2898442943b09a6f99fefc7a204b8d55fd8edd7b6217fd4417a6

  • SSDEEP

    12288:EucY53C3C44qbBievYFL461gWO3dQQctdAyATnG:1x+1Q54+gWO2QctdAyAT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0727f27067131d306b7ad5b8a07fa590_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0727f27067131d306b7ad5b8a07fa590_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Program Files\within\Documentation.exe
      "C:\Program Files\within\Documentation.exe" "33201"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\within\Documentation.exe

    Filesize

    397KB

    MD5

    da9b55bc9f649df78f169fa333016a5c

    SHA1

    3df0ad89e690c8eed883a4bb8b991350f67226c6

    SHA256

    fb9f4dadeb3c76163e5873427d3572effcd50b71049150c7b6bf69f844cbf3da

    SHA512

    437abe94a5dd39b5b24c4a5db37baa49646ff59893e5b51d96a380fedd2551c7411bbf0ecdfa942b4528175b7d1451223df1fb90a83032fb9494dc485d4bb588