Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
37dc5a399215959aaf121339215ba1d0_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
37dc5a399215959aaf121339215ba1d0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
37dc5a399215959aaf121339215ba1d0_NeikiAnalytics.dll
-
Size
81KB
-
MD5
37dc5a399215959aaf121339215ba1d0
-
SHA1
3e8d69b29373cc32af3bbf4d245f97b03364e9bd
-
SHA256
fc8d5f6009c8f4e2e3ef0b95f27301e7049aabe9804189aae1b013c7c43de75d
-
SHA512
cd3827d9c9165123bfef66f6ea5d818f8669e8f8a2ea97d520c291fa01f50f9fbcbceaa8e7e904b4db3299a9a37004d847e190242e2de7ef905c2f3e36399726
-
SSDEEP
1536:CtByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8WZ:C4v4JKXTx71w0ArSsXF3enq8WZ
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe PID 2220 wrote to memory of 1232 2220 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37dc5a399215959aaf121339215ba1d0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\37dc5a399215959aaf121339215ba1d0_NeikiAnalytics.dll,#12⤵PID:1232