Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 17:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
04aa33051890860a103f10424fa7a100_NeikiAnalytics.dll
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
04aa33051890860a103f10424fa7a100_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
04aa33051890860a103f10424fa7a100_NeikiAnalytics.dll
-
Size
212KB
-
MD5
04aa33051890860a103f10424fa7a100
-
SHA1
2313ae0173568cce7341a6f60126374c2381612f
-
SHA256
5bdc9e7c1fdef66d5f2eb4eedb8d522d205d512c8339f69cb367c70711b94827
-
SHA512
d941d8ae182b8592c0cfd5d0c785e60f327822296c233283cac8f6a47a42e28e81bf212833d167db7235bdedf2a6b52c4072e865cc8fc3f222966146aaae66d1
-
SSDEEP
3072:Dtovicomo6DPCEE+tKUjYPp24Iz03nQCwxshWbx8uAlNlU3hHCDXmG6t:uvico6xEgbE0z4nQZrx1Jh+
Score
1/10
Malware Config
Signatures
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\04aa33051890860a103f10424fa7a100_NeikiAnalytics.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\ = "MachDevice" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0C9FB259-B864-40A5-B59F-65E11E209FC4}\1.0\FLAGS\ = "0" regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3960 1988 regsvr32.exe 83 PID 1988 wrote to memory of 3960 1988 regsvr32.exe 83 PID 1988 wrote to memory of 3960 1988 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\04aa33051890860a103f10424fa7a100_NeikiAnalytics.dll1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\04aa33051890860a103f10424fa7a100_NeikiAnalytics.dll2⤵
- Modifies registry class
PID:3960
-