Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
407930ae3a2bef865c954c47bc0abe00_NeikiAnalytics.dll
Resource
win7-20240419-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
407930ae3a2bef865c954c47bc0abe00_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
407930ae3a2bef865c954c47bc0abe00_NeikiAnalytics.dll
-
Size
4KB
-
MD5
407930ae3a2bef865c954c47bc0abe00
-
SHA1
3f79e970c71027627a41b8bfde719f485bb58ff1
-
SHA256
5df4f19cf39ca316119e1d2982427af74a8c61e4f1edca767645d60ec2d9cda4
-
SHA512
c42ad470145e02b81875bfbf21ccfef93787f9acf008e7adb66b55eb101e14a9640e6a72b048f7304d80cb226746d2c05056d33196272db4a2685960d374d7e9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4540 wrote to memory of 3972 4540 rundll32.exe 82 PID 4540 wrote to memory of 3972 4540 rundll32.exe 82 PID 4540 wrote to memory of 3972 4540 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\407930ae3a2bef865c954c47bc0abe00_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\407930ae3a2bef865c954c47bc0abe00_NeikiAnalytics.dll,#12⤵PID:3972
-