Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 06:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8fcd17e58088055fa4641d9adf369910_NeikiAnalytics.dll
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
General
-
Target
8fcd17e58088055fa4641d9adf369910_NeikiAnalytics.dll
-
Size
921KB
-
MD5
8fcd17e58088055fa4641d9adf369910
-
SHA1
b47e4ebd5efef8d8043cd98796e8eb1ed4f0adb9
-
SHA256
4a01b2a6f981f98e652ff0272c74954732bf70aad796f1ddaafd964160c7a919
-
SHA512
0771b9666bd05016be3a087bf389491433194719dcd59ae2cfe4593171e7b95570118fa36199adb100780ca82854eeecac8c972ce97f9be613c9de4f77b3ae38
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYY2jjjjjjjjjjjjjjjjjjjjjjk:o6RI1Fo/wT3cJYYYYYYYYYYYY7
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 2444 540 rundll32.exe 82 PID 540 wrote to memory of 2444 540 rundll32.exe 82 PID 540 wrote to memory of 2444 540 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8fcd17e58088055fa4641d9adf369910_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8fcd17e58088055fa4641d9adf369910_NeikiAnalytics.dll,#12⤵PID:2444
-