Analysis
-
max time kernel
131s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8ac29bb2d3ae9e98a1d437f9df7ec9f0_NEIKI.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8ac29bb2d3ae9e98a1d437f9df7ec9f0_NEIKI.dll
Resource
win10v2004-20240419-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
8ac29bb2d3ae9e98a1d437f9df7ec9f0_NEIKI.dll
-
Size
915KB
-
MD5
8ac29bb2d3ae9e98a1d437f9df7ec9f0
-
SHA1
2394a8f2c27d7dd53e9debc1f0d279b2fecd75b0
-
SHA256
f229da2f35d4041732c368e9ce8838fb63da9080383a75d4e5628fe6b94ab550
-
SHA512
79db323634e78b1697c8e7944e8055a78775a062995edb68b8afcb8c069d88f1887bedaa8a2c0cd73dfa9e07f5c2eba35766eec4d746da05c63c8ab094773923
-
SSDEEP
12288:5diG/ti3NusCcoU0mlU0mlU0mlU0mlU0mA:5t/UcsoUUUU
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2580 1248 rundll32.exe 83 PID 1248 wrote to memory of 2580 1248 rundll32.exe 83 PID 1248 wrote to memory of 2580 1248 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac29bb2d3ae9e98a1d437f9df7ec9f0_NEIKI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ac29bb2d3ae9e98a1d437f9df7ec9f0_NEIKI.dll,#12⤵PID:2580
-