Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
046b035f454b5ad2261afe9b8e01c8c0_NeikiAnalytics.dll
Resource
win7-20231129-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
046b035f454b5ad2261afe9b8e01c8c0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
046b035f454b5ad2261afe9b8e01c8c0_NeikiAnalytics.dll
-
Size
81KB
-
MD5
046b035f454b5ad2261afe9b8e01c8c0
-
SHA1
c3dd96b5961478f36c836fb302e9d9adf597dc8d
-
SHA256
97bcfe703ea42a3fd4160f8169788884ec242bedff34ecb602555f971e9d02f9
-
SHA512
6a9737a947b42a2be221f0f62013c6e72efbefc8dc403f1474083256ea141efc31a434d1bc475472052e30d4608e81ba7c6c485812f2c67503f222dc9ac09c3a
-
SSDEEP
1536:1tByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8Wu:14v4JKXTx71w0ArSsXF3enq8Wu
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe PID 2360 wrote to memory of 2176 2360 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\046b035f454b5ad2261afe9b8e01c8c0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\046b035f454b5ad2261afe9b8e01c8c0_NeikiAnalytics.dll,#12⤵PID:2176
-