Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 17:30
Behavioral task
behavioral1
Sample
039a8a17cb0c6fda93a7fcd2c6df25b0_NeikiAnalytics.dll
Resource
win7-20231129-en
windows7-x64
3 signatures
150 seconds
General
-
Target
039a8a17cb0c6fda93a7fcd2c6df25b0_NeikiAnalytics.dll
-
Size
38KB
-
MD5
039a8a17cb0c6fda93a7fcd2c6df25b0
-
SHA1
21ff3a6c8ed3c9d994052ff5f8527d8a0773eb57
-
SHA256
31c3e801b2cadf6b05b081de51105f749ab712e78acd30ebd5d65037da8c1f2d
-
SHA512
59d379d1655536f88afbb1a7c9e95b7e46dcffd68874befeffa7fdb6602421121bf5d38765ff79162d7c067002ae97d0f3cfadc5604d7406e06246d0c047f581
-
SSDEEP
768:Bs+/gMsLIn/wIj2labk+1IsceGSnkmJ0Yblr583CJrVV7AsXU76m2s2AVV:WD8w22laSR0V+3CJrVnXczJ2
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Windows\SysWOW64\dmlconf.dat rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe PID 2364 wrote to memory of 2204 2364 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\039a8a17cb0c6fda93a7fcd2c6df25b0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\039a8a17cb0c6fda93a7fcd2c6df25b0_NeikiAnalytics.dll,#12⤵
- Drops file in System32 directory
PID:2204