Analysis
-
max time kernel
136s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 19:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21510f856625178ca207afc73ecd1950_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
21510f856625178ca207afc73ecd1950_NeikiAnalytics.dll
-
Size
693KB
-
MD5
21510f856625178ca207afc73ecd1950
-
SHA1
8694f40ac973c8cc82ae5e02a1d0d1da6a5947c8
-
SHA256
99f662caf9123079b4a0808d2cef28a7923ab681b57911cf031e1be749562c67
-
SHA512
110d157d4464cbf7355df0cdf22a40d765972736598731b6dfdb61b6874ba10534adb9cb0e5468bee2b1c3bf5c74b92c7d180eae325e135a11e0bb60e2cafe64
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYf:o6RI1Fo/wT3cJYYYYYYYYYYYYf
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4364 3680 rundll32.exe 82 PID 3680 wrote to memory of 4364 3680 rundll32.exe 82 PID 3680 wrote to memory of 4364 3680 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21510f856625178ca207afc73ecd1950_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21510f856625178ca207afc73ecd1950_NeikiAnalytics.dll,#12⤵PID:4364
-