Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 17:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c001fa0a34eab81039358d19d07ad7a0_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
c001fa0a34eab81039358d19d07ad7a0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
c001fa0a34eab81039358d19d07ad7a0_NeikiAnalytics.dll
-
Size
4KB
-
MD5
c001fa0a34eab81039358d19d07ad7a0
-
SHA1
9fcb6fcb34c45c4993c424a8059294302d333b01
-
SHA256
b3e5014021439d0c729a160827d6fc21d5bd9f51e4cee61c337993e1cb132b39
-
SHA512
02cecdfa404ec0f633fa8e364407f2c918554b6e6b1fca3355819dce5757680ab5a0734955713ccba74e71a6e4199b510898a412e1ac2cfbf4d6dedbd420e9ed
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 856 wrote to memory of 4328 856 rundll32.exe 82 PID 856 wrote to memory of 4328 856 rundll32.exe 82 PID 856 wrote to memory of 4328 856 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c001fa0a34eab81039358d19d07ad7a0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c001fa0a34eab81039358d19d07ad7a0_NeikiAnalytics.dll,#12⤵PID:4328
-