Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 00:19
Behavioral task
behavioral1
Sample
3888e43272a498ef7bdbacd3fe3fd0d0_NeikiAnalytics.dll
Resource
win7-20240419-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
3888e43272a498ef7bdbacd3fe3fd0d0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
3888e43272a498ef7bdbacd3fe3fd0d0_NeikiAnalytics.dll
-
Size
76KB
-
MD5
3888e43272a498ef7bdbacd3fe3fd0d0
-
SHA1
5d2cfe3f0e6add36a5ad35f83995d23044596e98
-
SHA256
41a292098c3df9433ab9e706e7fd16f74798010c7bf250af4838b53e8cf7da90
-
SHA512
83d03f7706aebea715cb41a7bf4eab0c4eed95832a1a3d0e4ba2907424f7db14718053ca38eee2f679b09fbbc751b13b65dabc0ce3226ba340562098f9a6188f
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7Z53UgdA4:c8y93KQjy7G55riF1cMo03Lkg/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1564-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/1564-1-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1564 rundll32.exe 1564 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1564 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1688 wrote to memory of 1564 1688 rundll32.exe 83 PID 1688 wrote to memory of 1564 1688 rundll32.exe 83 PID 1688 wrote to memory of 1564 1688 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3888e43272a498ef7bdbacd3fe3fd0d0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3888e43272a498ef7bdbacd3fe3fd0d0_NeikiAnalytics.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1564
-