Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 03:31
Behavioral task
behavioral1
Sample
00e3425054bdd4837898bd03c0f1dcc0_NeikiAnalytics.dll
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
00e3425054bdd4837898bd03c0f1dcc0_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
00e3425054bdd4837898bd03c0f1dcc0_NeikiAnalytics.dll
-
Size
76KB
-
MD5
00e3425054bdd4837898bd03c0f1dcc0
-
SHA1
a3f6367dccdbce4c806bbca93f7310a12c7d1670
-
SHA256
3f461b50df4b665527c93c68d1c08a5a9f85a884b3360b8acb7fd90585b6e717
-
SHA512
4dd37737893bc0cd1d997c497629a20420e0db8fbe273042f74e639b6a3b4d62cd7efa4db9f25605d20aafa61f14b9e136f428bd2a40a3ac1e5559e06ddc8668
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZERMhkT:c8y93KQjy7G55riF1cMo03a
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/4960-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4960-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3940 4960 WerFault.exe 91 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4960 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4960 3076 rundll32.exe 91 PID 3076 wrote to memory of 4960 3076 rundll32.exe 91 PID 3076 wrote to memory of 4960 3076 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e3425054bdd4837898bd03c0f1dcc0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e3425054bdd4837898bd03c0f1dcc0_NeikiAnalytics.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 6723⤵
- Program crash
PID:3940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4960 -ip 49601⤵PID:1620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:3100