Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:23
Behavioral task
behavioral1
Sample
06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll
-
Size
76KB
-
MD5
06104b169b1afc0c1327dc7de1050cc0
-
SHA1
ac5f5729b143b2ee39ef49f4fa6584c006020537
-
SHA256
378d2f36c57ff4350eadb249519f27a86247c1fa07cfee143f244778e6bffc5f
-
SHA512
c39a4d34b3672e0b75d87c325bf6035da8f0ed9838c36c56b7b5f661e8db59fd0d00a263fc2aeaa04a2a806a93b267e262e6bd35f8715a6c716c6ddd20a182db
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZAWAJXJB:c8y93KQjy7G55riF1cMo036WUXb
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5084-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/5084-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 5084 rundll32.exe 5084 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 5084 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2596 wrote to memory of 5084 2596 rundll32.exe rundll32.exe PID 2596 wrote to memory of 5084 2596 rundll32.exe rundll32.exe PID 2596 wrote to memory of 5084 2596 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06104b169b1afc0c1327dc7de1050cc0_NeikiAnalytics.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084