Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 19:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04a79de582cc7c99d7cbf2678021c150_NeikiAnalytics.dll
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
04a79de582cc7c99d7cbf2678021c150_NeikiAnalytics.dll
-
Size
617KB
-
MD5
04a79de582cc7c99d7cbf2678021c150
-
SHA1
093ceba0a2ea5939b9deb5a0868778275497d092
-
SHA256
9f19cb96e25fd5eec8205571ef36254238216720e2f40858cd2c196fa7abb0db
-
SHA512
26d32966152a4276ede86b9c8422038ea419fb68d8ca46c7f86e0f733877331c56a0cecdf55f8436150c2ff3d33d6b38cfde1e2974ec0d3c508c3c98a555a2cf
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYV:o6RI1Fo/wT3cJYYYYYYYYYYYYV
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 5116 2348 rundll32.exe 81 PID 2348 wrote to memory of 5116 2348 rundll32.exe 81 PID 2348 wrote to memory of 5116 2348 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04a79de582cc7c99d7cbf2678021c150_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\04a79de582cc7c99d7cbf2678021c150_NeikiAnalytics.dll,#12⤵PID:5116
-