Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:23
Behavioral task
behavioral1
Sample
06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll
-
Size
76KB
-
MD5
06104b169b1afc0c1327dc7de1050cc0
-
SHA1
ac5f5729b143b2ee39ef49f4fa6584c006020537
-
SHA256
378d2f36c57ff4350eadb249519f27a86247c1fa07cfee143f244778e6bffc5f
-
SHA512
c39a4d34b3672e0b75d87c325bf6035da8f0ed9838c36c56b7b5f661e8db59fd0d00a263fc2aeaa04a2a806a93b267e262e6bd35f8715a6c716c6ddd20a182db
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZAWAJXJB:c8y93KQjy7G55riF1cMo036WUXb
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Processes:
resource yara_rule behavioral1/memory/2280-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/2280-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2096 2280 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 2280 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2916 wrote to memory of 2280 2916 rundll32.exe rundll32.exe PID 2280 wrote to memory of 2096 2280 rundll32.exe WerFault.exe PID 2280 wrote to memory of 2096 2280 rundll32.exe WerFault.exe PID 2280 wrote to memory of 2096 2280 rundll32.exe WerFault.exe PID 2280 wrote to memory of 2096 2280 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 3043⤵
- Program crash
PID:2096