Analysis
-
max time kernel
132s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 20:03
Static task
static1
Behavioral task
behavioral1
Sample
1b3e302c1f6f6a872978e9658ebffe20_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1b3e302c1f6f6a872978e9658ebffe20_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
General
-
Target
1b3e302c1f6f6a872978e9658ebffe20_NeikiAnalytics.dll
-
Size
430KB
-
MD5
1b3e302c1f6f6a872978e9658ebffe20
-
SHA1
669bdb182b02034eaaf62845f5e2176657c4866d
-
SHA256
3a699694ea25ad8bec642cc3c913c4414c349abc8aa7105ee26102c09bef7499
-
SHA512
74b22f992829c8e071449f7ec0eef61f0575d1d3b7201a5459feb0586b4dc97c148fb5b4f2d0f4ccad56a3b25cf6a485b22a2be36ccec14daa8dac8c5f2517c9
-
SSDEEP
12288:TP7xf5HU/AqVqhQQecOIsV/AWmiynaxYDs5F8r:TDz6F6CP/fkax78
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1932 1632 rundll32.exe 84 PID 1632 wrote to memory of 1932 1632 rundll32.exe 84 PID 1632 wrote to memory of 1932 1632 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b3e302c1f6f6a872978e9658ebffe20_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1b3e302c1f6f6a872978e9658ebffe20_NeikiAnalytics.dll,#12⤵PID:1932
-