Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe
-
Size
2.3MB
-
MD5
82059a041edfbba699f7d184a2b8fbb0
-
SHA1
076d4f1b16b0aa20fd6beffc66d8b53338a63ad1
-
SHA256
1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7
-
SHA512
8185077cb55b04d0c824815dcc64f2836aa6ae134e8ceee965f28fed3b86dc91a19b7f9a3a962e4e3c522f294461a9431dc4fbf0bfdcc8fc3d08aa1a8221c628
-
SSDEEP
49152:YKkvJokpsE7RoWVTjqF+xCJZYp8KCXylsMqqW9bRXSv:YKkRoEsgR50+xMTBXylsMEnSv
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AutoRun = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe" 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe 2244 1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1594440253951f270075508f0646ce19384f6add8156a5f29160432210124de7_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2244