Analysis

  • max time kernel
    141s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 04:25

General

  • Target

    875b028a8ca0ee45799d10839adf4220_NeikiAnalytics.exe

  • Size

    1.3MB

  • MD5

    875b028a8ca0ee45799d10839adf4220

  • SHA1

    a08631585660328e977ee9b5d4ec775e6f500b2e

  • SHA256

    4416a6a617a48348a83ece8cb3badb07b9ddfe4ed98a4ccbd0bcb581292e1882

  • SHA512

    555b7c33f0390181ddca1a0190e7ac79778aa543ee9b0c5b3de3aef68e41f52851d541a67d1be390bdf726c6f14be59cec2b5d4ea8f0304b00b4282a626bcbe0

  • SSDEEP

    24576:HQgEfrP/KMT+xTxN9Mj4+SClWNqnYx7IPwOT8UMwQ4ez+8Cospn3ULVHmxh:xEDP/KMSxKj4xkP1T8UMl4eybKLho

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\875b028a8ca0ee45799d10839adf4220_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\875b028a8ca0ee45799d10839adf4220_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetWindowsHookEx
    PID:4352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4352-1-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-2-0x0000000001374000-0x0000000001412000-memory.dmp

    Filesize

    632KB

  • memory/4352-4-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-5-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-6-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-7-0x0000000001374000-0x0000000001412000-memory.dmp

    Filesize

    632KB

  • memory/4352-8-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-9-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-10-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-11-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-12-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-13-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-14-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-15-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-16-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-17-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-18-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB

  • memory/4352-19-0x0000000000EE0000-0x0000000001412000-memory.dmp

    Filesize

    5.2MB