Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 04:19
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ea92d74b6f7179b940dbe525c351b10_NeikiAnalytics.dll
Resource
win7-20240419-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1ea92d74b6f7179b940dbe525c351b10_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
1ea92d74b6f7179b940dbe525c351b10_NeikiAnalytics.dll
-
Size
327KB
-
MD5
1ea92d74b6f7179b940dbe525c351b10
-
SHA1
53704167f82c091050d623c304dce6aa21b4d8e7
-
SHA256
76a1c38c836aabc0e6bfd779bc0a9523b6c0f7284e72d470046d6e85f30539b3
-
SHA512
842a0918cbc362520deaadfbf9e1024a75e6f13ab4810cf69927608273cfc2512ebf0e1367e6cf8f51bb74c1a1008e74a066eb0672e599724b71304b6940ef4c
-
SSDEEP
6144:EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC48Ss9Ei:EmWhND9yJz+b1FcMLmp2AT8Ssd
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2324 2052 rundll32.exe 28 PID 2052 wrote to memory of 2324 2052 rundll32.exe 28 PID 2052 wrote to memory of 2324 2052 rundll32.exe 28 PID 2052 wrote to memory of 2324 2052 rundll32.exe 28 PID 2052 wrote to memory of 2324 2052 rundll32.exe 28 PID 2052 wrote to memory of 2324 2052 rundll32.exe 28 PID 2052 wrote to memory of 2324 2052 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ea92d74b6f7179b940dbe525c351b10_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1ea92d74b6f7179b940dbe525c351b10_NeikiAnalytics.dll,#12⤵PID:2324
-