Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 12:32
Behavioral task
behavioral1
Sample
0d3e035da8bc15c268d5524935478180_NeikiAnalytics.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d3e035da8bc15c268d5524935478180_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0d3e035da8bc15c268d5524935478180_NeikiAnalytics.dll
-
Size
76KB
-
MD5
0d3e035da8bc15c268d5524935478180
-
SHA1
6000057488b33607c3faa06ff43a01f4598659e9
-
SHA256
1d471a90264a8d905a5f490e7cb1de7a12810522fc31cf777909feeceda207c0
-
SHA512
4a883b8667343daeb12b685bab8d359be959ca65a8cce1462191a83bab72ae8495ec444da99fedf86a4db63d6e0c6c05dd74e942e5c89663a40595885734cfd3
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZuxGkLrB:c8y93KQjy7G55riF1cMo030Ll
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2576-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/2576-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1784 2576 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3576 wrote to memory of 2576 3576 rundll32.exe 81 PID 3576 wrote to memory of 2576 3576 rundll32.exe 81 PID 3576 wrote to memory of 2576 3576 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d3e035da8bc15c268d5524935478180_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d3e035da8bc15c268d5524935478180_NeikiAnalytics.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 7123⤵
- Program crash
PID:1784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2576 -ip 25761⤵PID:1228