Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18-05-2024 13:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ca75f031ad969647c232eca59552b0c0_NeikiAnalytics.dll
Resource
win7-20240215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
ca75f031ad969647c232eca59552b0c0_NeikiAnalytics.dll
-
Size
508KB
-
MD5
ca75f031ad969647c232eca59552b0c0
-
SHA1
5dad46c24b47e53e313f22d3b874aed432df9eb3
-
SHA256
ac663c1dccf3868c4a2e3ee6bc16c3c5dd351c9abbb93313f45f5ef51154d862
-
SHA512
69433de8471bd10944e8421d1c5c18da8f9bf7c58f704ced18b3a20cfac076893d5d69985edbc5d24e23cb09d8b461ea288d2826f4fd0248306fdd351ab812e7
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q01:jDgtfRQUHPw06MoV2nwTBlhm89
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 904 2564 rundll32.exe 85 PID 2564 wrote to memory of 904 2564 rundll32.exe 85 PID 2564 wrote to memory of 904 2564 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca75f031ad969647c232eca59552b0c0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ca75f031ad969647c232eca59552b0c0_NeikiAnalytics.dll,#12⤵PID:904
-