Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 04:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9431ac4c2a2570c02838b1c8ca2b1280_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
9431ac4c2a2570c02838b1c8ca2b1280_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
9431ac4c2a2570c02838b1c8ca2b1280_NeikiAnalytics.dll
-
Size
82KB
-
MD5
9431ac4c2a2570c02838b1c8ca2b1280
-
SHA1
cb25900d54753f639303858346a70d4d6b0daae9
-
SHA256
d6c686386b985ea4aaf6db448fe8aa0e44c85ac4c7d02b133c34b58ef2ed0105
-
SHA512
ee8f171fe01d1b7e1162741c2e8a5c5e53ef4439f6427dfffef9935023b20711497831cd7ab0664f63238b86a89a8e210d28c3b4c63136bf290d802cf88cef25
-
SSDEEP
1536:e/yJSXzL3Mh7ULu2Dmy6LeC5jjS6LGN3cuRmkgOo5041Ah:e/y2H3Mh7Ym9ecjj/LQ7YkgOojeh
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4520 4664 rundll32.exe 82 PID 4664 wrote to memory of 4520 4664 rundll32.exe 82 PID 4664 wrote to memory of 4520 4664 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9431ac4c2a2570c02838b1c8ca2b1280_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9431ac4c2a2570c02838b1c8ca2b1280_NeikiAnalytics.dll,#12⤵PID:4520
-