Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 04:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
699db575a24d9fb5c29982279981a570_NeikiAnalytics.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
699db575a24d9fb5c29982279981a570_NeikiAnalytics.dll
-
Size
779KB
-
MD5
699db575a24d9fb5c29982279981a570
-
SHA1
ffaf0fea4f767b73df8b4adeeb3c602e4e1a4fac
-
SHA256
92b6ab2fa8c7dd21bc2788aac270165274ce615d726bdb415dc405ea00d4e84e
-
SHA512
cfb3a26159625940e3b284c0ed56cf91283506590c9e6c697022da25ffc364a623aa0e8e750ac6b3124fa4a55adc8c04f77f7cdd8cbd3fda81993677ffd1f8e5
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYQ:o6RI1Fo/wT3cJYYYYYYYYYYYYQ
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4196 wrote to memory of 2408 4196 rundll32.exe 82 PID 4196 wrote to memory of 2408 4196 rundll32.exe 82 PID 4196 wrote to memory of 2408 4196 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\699db575a24d9fb5c29982279981a570_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\699db575a24d9fb5c29982279981a570_NeikiAnalytics.dll,#12⤵PID:2408
-