Analysis

  • max time kernel
    93s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 14:25

General

  • Target

    37f06f74fffff92a968495858edf3cb0_NeikiAnalytics.exe

  • Size

    324KB

  • MD5

    37f06f74fffff92a968495858edf3cb0

  • SHA1

    bc05305150f9d1fbf779044452e7afd656dcfb27

  • SHA256

    baee4c0d9c0ec7557574aa7c0778489300361759bdad35fc8a6193ca90a2c39e

  • SHA512

    59979fb8411cfd46950cd9f02985ed2738e5896533ba3a8fa6922735fb4c9be5223eb678dc1b83850c76fbc7128f46f2d601b42166c67d9998f92986ce117822

  • SSDEEP

    6144:wHgjogOz76mO907l9gGZKYmMPnLCCXraorN7VF0jCFmOOq:0Z6mOaOMPnLb+4y+v

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37f06f74fffff92a968495858edf3cb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\37f06f74fffff92a968495858edf3cb0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads