Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 09:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c88109e22312a3d09a679ed0f710030_NeikiAnalytics.dll
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
General
-
Target
3c88109e22312a3d09a679ed0f710030_NeikiAnalytics.dll
-
Size
1.0MB
-
MD5
3c88109e22312a3d09a679ed0f710030
-
SHA1
19da28a0182b94ceca7acd458771c005d8eb7608
-
SHA256
f53e53b59d413d9ec2e732dcc80506e310c495624df86a6541ad652b85926eed
-
SHA512
0380e3aa1dd126d3d54793c529124e687f95981bf1bfe11e722fa1d63e37d82b0699b0526fe8162eed2ded49aae50e46ce553fbc9f3f517e6e648b0179d0694d
-
SSDEEP
6144:o6C5AXbMn7UI1FoV2gwTBlrIckPJYYYYYYYYYYYYi:o6RI1Fo/wT3cJYYYYYYYYYYYYi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4012 4772 rundll32.exe 81 PID 4772 wrote to memory of 4012 4772 rundll32.exe 81 PID 4772 wrote to memory of 4012 4772 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c88109e22312a3d09a679ed0f710030_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c88109e22312a3d09a679ed0f710030_NeikiAnalytics.dll,#12⤵PID:4012
-