Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 14:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
66cab367ec94f0c85ce1b335b2edbff0_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
66cab367ec94f0c85ce1b335b2edbff0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
66cab367ec94f0c85ce1b335b2edbff0_NeikiAnalytics.dll
-
Size
3KB
-
MD5
66cab367ec94f0c85ce1b335b2edbff0
-
SHA1
b4555fc8f48cfcf9134ef58094dde035964eb167
-
SHA256
88f2248ae18d368e55d7e389a260e1ad54d3c7f766534388ff43db5c98ab8b05
-
SHA512
23bd3ae67329eb26c6d24132f275ffa1b8acfad69369b1953b6c72809a4c29c65fbc2bdf678b382dd2354bff7b8c27aa1a74e5208401eb226c8faa56a7df897c
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1932 2092 rundll32.exe 80 PID 2092 wrote to memory of 1932 2092 rundll32.exe 80 PID 2092 wrote to memory of 1932 2092 rundll32.exe 80
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66cab367ec94f0c85ce1b335b2edbff0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\66cab367ec94f0c85ce1b335b2edbff0_NeikiAnalytics.dll,#12⤵PID:1932
-