Analysis

  • max time kernel
    92s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 11:40

General

  • Target

    0a4878ace9aa9c150d89762621afad91a83fc222b354552b98ce971a5cae71be_NeikiAnalytics.exe

  • Size

    2.5MB

  • MD5

    47f849b3763a6d54da3dbdf3a900aa50

  • SHA1

    a8d462bf8c54ff59ce506040a668af7cc7d77d0e

  • SHA256

    0a4878ace9aa9c150d89762621afad91a83fc222b354552b98ce971a5cae71be

  • SHA512

    376de887e7e51a76273a2298c2ae6a09764bf0ca84dab97a125e21b96baec06429d596a044a1e386ece7576842cf4e6e8a47d318d6b73ba4eb798009d7aaf9e2

  • SSDEEP

    49152:ub6KygVbu643paE1mSqx8HHY2XAiCWiiE+FhFgkICdI2O2vIDdNOAwDU:LjbZD1LYQVii3FhekZd+2v0yU

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a4878ace9aa9c150d89762621afad91a83fc222b354552b98ce971a5cae71be_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a4878ace9aa9c150d89762621afad91a83fc222b354552b98ce971a5cae71be_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5020-0-0x0000000000400000-0x00000000009E5000-memory.dmp
    Filesize

    5.9MB

  • memory/5020-1-0x0000000000400000-0x00000000009E5000-memory.dmp
    Filesize

    5.9MB

  • memory/5020-3-0x0000000077040000-0x0000000077041000-memory.dmp
    Filesize

    4KB

  • memory/5020-4-0x0000000077660000-0x0000000077661000-memory.dmp
    Filesize

    4KB

  • memory/5020-5-0x0000000000400000-0x00000000009E5000-memory.dmp
    Filesize

    5.9MB