Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 11:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cfa7801de2a69b4c35435c7792e3c9b0_NeikiAnalytics.dll
Resource
win7-20240215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
cfa7801de2a69b4c35435c7792e3c9b0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
cfa7801de2a69b4c35435c7792e3c9b0_NeikiAnalytics.dll
-
Size
5KB
-
MD5
cfa7801de2a69b4c35435c7792e3c9b0
-
SHA1
fe24104944249ab21982f6fef7ecd429a6714d5b
-
SHA256
c9f395ce5208a33d554a75bfef9d969a2410bbe611c1f7c72882324623f3a6b8
-
SHA512
d6ed4e2b75e921d345cc1e6e45b40fc70edbca67e36824e30c8b780a687e4cb15a89dfa74dfe41d7e1e484068cebe46eee95c183af5fc573b1f63b2b8a019d01
-
SSDEEP
48:SsGp63gAST0cMLlD7prUlG9NzgcOj3Zpi8SJAjtWjSsSkAYD1ILxqcIqm0abOcD7:VGEETrMLH5CxqDgYD1UxqcmDZDtG1z
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4468 1196 rundll32.exe 81 PID 1196 wrote to memory of 4468 1196 rundll32.exe 81 PID 1196 wrote to memory of 4468 1196 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cfa7801de2a69b4c35435c7792e3c9b0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cfa7801de2a69b4c35435c7792e3c9b0_NeikiAnalytics.dll,#12⤵PID:4468
-