Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 23:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72c08339b452b78c80b743d20f4119a0_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
72c08339b452b78c80b743d20f4119a0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
72c08339b452b78c80b743d20f4119a0_NeikiAnalytics.dll
-
Size
3KB
-
MD5
72c08339b452b78c80b743d20f4119a0
-
SHA1
242baefbbbd43a8575e14f73b7442c0d56087e37
-
SHA256
32c80dae7c54c93c959f8b2d4d490cdec2165a8aba31c7e7cf16a8db1f99257d
-
SHA512
d72dd251a5b295a299801c9cc9782990817ee6cc64fbd2b97340aedf1b410e7fe0ae7927213f040ee34fb03b7b3a80e5992e7f4d37fcc860a17f4c773a9566f3
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 740 wrote to memory of 3312 740 rundll32.exe 82 PID 740 wrote to memory of 3312 740 rundll32.exe 82 PID 740 wrote to memory of 3312 740 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72c08339b452b78c80b743d20f4119a0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\72c08339b452b78c80b743d20f4119a0_NeikiAnalytics.dll,#12⤵PID:3312
-