Analysis
-
max time kernel
136s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 09:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d5d48a3742480dac063cda8645783500_NeikiAnalytics.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
d5d48a3742480dac063cda8645783500_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
d5d48a3742480dac063cda8645783500_NeikiAnalytics.dll
-
Size
3KB
-
MD5
d5d48a3742480dac063cda8645783500
-
SHA1
7b5378583d4a63b00dc909367408c3d977bacb89
-
SHA256
aa4241846a79176e6c62d80fd2bf6512a1c5f8628a9b2bfef5e3a673e183663c
-
SHA512
cfcc3fc032a77a1f5dc9f0e211be87052f43dbbcf43026629d42ad637035db8ee1b647ea88269976c06f3f2ba67aa4cbb6c814cbc3bf22cf3224be4ea0363755
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3524 4536 rundll32.exe 84 PID 4536 wrote to memory of 3524 4536 rundll32.exe 84 PID 4536 wrote to memory of 3524 4536 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5d48a3742480dac063cda8645783500_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5d48a3742480dac063cda8645783500_NeikiAnalytics.dll,#12⤵PID:3524
-