Analysis
-
max time kernel
136s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 19:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d97b6171811733c489e0e70adac454f0_NeikiAnalytics.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d97b6171811733c489e0e70adac454f0_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
d97b6171811733c489e0e70adac454f0_NeikiAnalytics.dll
-
Size
3.8MB
-
MD5
d97b6171811733c489e0e70adac454f0
-
SHA1
c8812d2ac7292b601b30d1d98a2cbf6a38531093
-
SHA256
a1c803fcf1517028cd90efac93bebaad7a01e1ebd78421039ff0a8472ca32b8b
-
SHA512
b2fa0f54476fd09981bcd569d28ed598fe0bb8fd5c8cc6881d0cb997004cd214e634946b737ff1b79636559938f5502ae69a486beb2799ed22ceacd88d3a769f
-
SSDEEP
49152:CueTqzEBHKBLu7Y5AYKTxo3jcgHWArXN/ZOD9hSgBt+y+ijdNmkgyo:CZQEBHKRu7Y5AYK1o3jcaMD9uyNvs
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3420 4884 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4884 4764 rundll32.exe 91 PID 4764 wrote to memory of 4884 4764 rundll32.exe 91 PID 4764 wrote to memory of 4884 4764 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d97b6171811733c489e0e70adac454f0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d97b6171811733c489e0e70adac454f0_NeikiAnalytics.dll,#12⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 6443⤵
- Program crash
PID:3420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4884 -ip 48841⤵PID:3584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5164 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:81⤵PID:3500