Analysis

  • max time kernel
    147s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 07:28

General

  • Target

    16014bfef18b0e561e9cf807f55023c0_NeikiAnalytics.exe

  • Size

    184KB

  • MD5

    16014bfef18b0e561e9cf807f55023c0

  • SHA1

    97b707519ef42f8c20fcf25c181af7f4b3708dc3

  • SHA256

    d2360d57b0dd5fc6279de267e87bc59e49ac496a00219be1d540e7abd01fab1c

  • SHA512

    751c7bb6da76db83842714bc46c3eac0f965b1487ae1df12b7e0caa3f4d2ec9b30bd72fdaa5a189037acf5c3987f565c329bd1ba490e961cdf3720888b53fc2c

  • SSDEEP

    3072:inJkmDoR2WQUdj0NXErhpdfkAvMqJviuy:invomQj0UhjfkAEqJviu

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16014bfef18b0e561e9cf807f55023c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\16014bfef18b0e561e9cf807f55023c0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2536

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61305.exe

    Filesize

    184KB

    MD5

    a278cf7cf0a39c41d30eb02a790db2bb

    SHA1

    8966d111f9b73c5ee4fc8551582f82cba1775a08

    SHA256

    f6ea7d8a760429e0cf99aab6cadd02a0e45d4fd9729befd62ccab9c6a702fd1a

    SHA512

    5a576decd740f2d69f11c99ad4f3601d7e1f736a24dc2c7a4e78cde57577a0b64c73e98106abad813d6f961e35c7d5652dbbec74a6e969cd9d7e26bc699b8748