Analysis
-
max time kernel
147s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
217127864edbe29a8890194717c0ad50_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
217127864edbe29a8890194717c0ad50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
217127864edbe29a8890194717c0ad50_NeikiAnalytics.exe
-
Size
184KB
-
MD5
217127864edbe29a8890194717c0ad50
-
SHA1
6d7695d961dcd425bd545fe62f5225e209fe75b0
-
SHA256
60a004983a2459a31c1830ee7ab28ec62215acf38f7629cbf3d467476ea16bf2
-
SHA512
b1bd0277e99eb9fdc69b15f6bb449f6e265b29bfa7fcdc4cff7c34e7b4acca4cd2bec8ee7739c82153a0b6ce1c88c80f1c4335e20935d959d66e8b16e48bc2a0
-
SSDEEP
3072:+WcAz5YWh+dCEn4OWOA8v3yolvnqbviuUyO:+WZYNnn4F8fyolPqbviuUy
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2216 217127864edbe29a8890194717c0ad50_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD524feb6948c60515a3775edd462d3bd59
SHA163bd162398d5b6930faf23cf5f2ae6329a3506e1
SHA2568a79678dd1cd2fa375fb0a35f7c0c71dd705618d7f93de08e09deb06249ad019
SHA512dff0340c0f50ec9a769c592ccc471cad518a658104b62dc1886c9e867a9575ae26b219dda4b8af0895292e84428b94a2c7a0c887d6410489705cd9d6b311a625