Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 05:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
885442848ae472b321c0021698f684e0_NeikiAnalytics.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
885442848ae472b321c0021698f684e0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
1 signatures
150 seconds
General
-
Target
885442848ae472b321c0021698f684e0_NeikiAnalytics.dll
-
Size
5KB
-
MD5
885442848ae472b321c0021698f684e0
-
SHA1
bacc4abda9a921ecbbec2a3990328877adf37eda
-
SHA256
917b851b31ec09260eae3321e16a301a585383e2e09e6b50838a4ebfda81e921
-
SHA512
39e5c0e28347abcc19bb35b9ed1902fa4ec9d017dd019c9dafd0a0462278b4b465471c3eac569ba4c952a9c3f5312fe7230e9757af1c377c43e7369553da7a56
-
SSDEEP
96:z0I9wZLrY0/ip94KzEnlmWSLz02nGQRqNLANrGh6+:JKZQz4KUlmDLWNd
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4032 wrote to memory of 3088 4032 rundll32.exe 82 PID 4032 wrote to memory of 3088 4032 rundll32.exe 82 PID 4032 wrote to memory of 3088 4032 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\885442848ae472b321c0021698f684e0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\885442848ae472b321c0021698f684e0_NeikiAnalytics.dll,#12⤵PID:3088
-