Analysis
-
max time kernel
132s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 10:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8461d794af0283b3f90fbb2105ffbcc0_NeikiAnalytics.dll
Resource
win7-20240215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
8461d794af0283b3f90fbb2105ffbcc0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
8461d794af0283b3f90fbb2105ffbcc0_NeikiAnalytics.dll
-
Size
5KB
-
MD5
8461d794af0283b3f90fbb2105ffbcc0
-
SHA1
77a8bbb8f30feaf217d20ab3da8f6c5060f222f0
-
SHA256
6a658429bde0c239b827ce4310c51258f9987366ca2a9e753342ad91b321fb65
-
SHA512
782d2ffacd030d1c9cf100a1ca53b6e8ea07646673ed96d63d88a006690e6d8d43d3d243fa8a5b5d283b22d8b1b392e59410e9725b4f0d4474a2ed850bc5f96c
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqheDHu////We8J80KTGfBU0B/omjWD86kAU:hy859x0P8Mac7KiLQS0eAUaO
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 748 wrote to memory of 5036 748 rundll32.exe 83 PID 748 wrote to memory of 5036 748 rundll32.exe 83 PID 748 wrote to memory of 5036 748 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8461d794af0283b3f90fbb2105ffbcc0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8461d794af0283b3f90fbb2105ffbcc0_NeikiAnalytics.dll,#12⤵PID:5036
-