Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 01:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7d8c90feb3e24eb3fac1b3f9ebab78e0_NeikiAnalytics.dll
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
General
-
Target
7d8c90feb3e24eb3fac1b3f9ebab78e0_NeikiAnalytics.dll
-
Size
606KB
-
MD5
7d8c90feb3e24eb3fac1b3f9ebab78e0
-
SHA1
9bf23cce09f7abdd7db64869870f7ae32876a319
-
SHA256
29f7131a5a0912f946876d8f596ffc17b8dbbb26ea80cadbe4ccfeda31e1a236
-
SHA512
c6635e484c00269a7c9397c0d2af2d8de214a7ca3295c86eecd7e9ac76a3cf49711f9a4dcbb76944a7a56ae13e19bd8c391f0e6a85c031dfb52dcd0ec80fe0f0
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYl:o6RI1Fo/wT3cJYYYYYYYYYYYYl
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4992 wrote to memory of 952 4992 rundll32.exe 83 PID 4992 wrote to memory of 952 4992 rundll32.exe 83 PID 4992 wrote to memory of 952 4992 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d8c90feb3e24eb3fac1b3f9ebab78e0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7d8c90feb3e24eb3fac1b3f9ebab78e0_NeikiAnalytics.dll,#12⤵PID:952
-