Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 00:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5225ba4a3361a3ba2579688512ea5fc0_NeikiAnalytics.dll
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
5225ba4a3361a3ba2579688512ea5fc0_NeikiAnalytics.dll
-
Size
444KB
-
MD5
5225ba4a3361a3ba2579688512ea5fc0
-
SHA1
15977f7de0f3895d7ffa947f922953f6d05bfdb9
-
SHA256
a1e5c8fd6e71c36134ab236ac699587700a6b46ff893c7be0cf8e129a879ee83
-
SHA512
03333723519ae3b91f92e5afb947f034f334c2e9330d65f4b49dfa7c47198e2e1a7334d5cab47530c445359971bc2de9385ab4e3ebbafad4cb8a97f660aa8ea2
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q02:jDgtfRQUHPw06MoV2nwTBlhm8u
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3764 wrote to memory of 4436 3764 rundll32.exe 81 PID 3764 wrote to memory of 4436 3764 rundll32.exe 81 PID 3764 wrote to memory of 4436 3764 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5225ba4a3361a3ba2579688512ea5fc0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5225ba4a3361a3ba2579688512ea5fc0_NeikiAnalytics.dll,#12⤵PID:4436
-