Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 13:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cee1bb61a46596c96986ef452dbdcef0_NEIKI.dll
Resource
win7-20240215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cee1bb61a46596c96986ef452dbdcef0_NEIKI.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
cee1bb61a46596c96986ef452dbdcef0_NEIKI.dll
-
Size
6KB
-
MD5
cee1bb61a46596c96986ef452dbdcef0
-
SHA1
70a0953028b33087e483b45ed21f85f00f59acf0
-
SHA256
56a4eae2894f859a2fa59b1bfc43e4be9779b820a758761cef6d7694af885260
-
SHA512
30564671c4a4f8d54b7c7af862b11615997b1c9a21f3fce1710b7d674616809d28e55a461c6255bfab3bbfd762acb02260cb72b1c8606a689e4d587beebd2ab7
-
SSDEEP
96:hy859x0P8MadIz90pqq2ler3wXTrNkiPv7H0NgD6C:F5oL/00FmA/lPzH08
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3212 4012 rundll32.exe 80 PID 4012 wrote to memory of 3212 4012 rundll32.exe 80 PID 4012 wrote to memory of 3212 4012 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cee1bb61a46596c96986ef452dbdcef0_NEIKI.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cee1bb61a46596c96986ef452dbdcef0_NEIKI.dll,#12⤵PID:3212
-