Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:16
Behavioral task
behavioral1
Sample
2cea88b7a2474bd3c58118bb5c9fe2f0_NeikiAnalytics.dll
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
2cea88b7a2474bd3c58118bb5c9fe2f0_NeikiAnalytics.dll
-
Size
68KB
-
MD5
2cea88b7a2474bd3c58118bb5c9fe2f0
-
SHA1
6459e4ded1c148951ce57f8c6f1695f88a62537c
-
SHA256
c7a5ac66a74de02098e80e9ba814c11e4549f4cb703c6dbf4e060b49bb82ff98
-
SHA512
9628696c1da719d7a62fbc8fe339b92255f0756056085b8089bec3440be60d540de70d5e5dead511e0698947866d748d07b1146420a917f3bfae2f0553746d1b
-
SSDEEP
1536:MLNd/Pk7btaoX7DypKr0wNWYIUSS9eyBpC0iZs3k:GNhY5aora80mWYI7uCXs3
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rrogjrty.exe rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe PID 1228 wrote to memory of 1716 1228 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cea88b7a2474bd3c58118bb5c9fe2f0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cea88b7a2474bd3c58118bb5c9fe2f0_NeikiAnalytics.dll,#12⤵
- Drops startup file
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1716-0-0x0000000010000000-0x0000000010014000-memory.dmpFilesize
80KB
-
memory/1716-3-0x0000000010000000-0x0000000010014000-memory.dmpFilesize
80KB
-
memory/1716-2-0x0000000010000000-0x0000000010014000-memory.dmpFilesize
80KB
-
memory/1716-1-0x0000000010000000-0x0000000010014000-memory.dmpFilesize
80KB