Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 09:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3c57d4a710cf1c72dd7be4788338b6c0_NeikiAnalytics.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
3c57d4a710cf1c72dd7be4788338b6c0_NeikiAnalytics.dll
Resource
win10v2004-20240426-en
1 signatures
150 seconds
General
-
Target
3c57d4a710cf1c72dd7be4788338b6c0_NeikiAnalytics.dll
-
Size
395KB
-
MD5
3c57d4a710cf1c72dd7be4788338b6c0
-
SHA1
07e037bf310e0cc6538f3b0b75529832427183e0
-
SHA256
681ec62a54d6037d4bbc56bd0532153c40746a5d3dd894acf304eca6a067d1cb
-
SHA512
3d1319d3383542ce017b518de7aa3861312773dc20b991e794be90e4be96e521d0856ed33b79cba34357a780fdab83514a265e68ca0908bc7e55f96509575507
-
SSDEEP
6144:ym4LBtqDgwJFvaUnS9iuVBYVduXdFylzHYewK54alncu5ExFCcfV50DErsAOggMN:G2L0ZiuV6Vc/ElckEnh4Db2gM
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1064 4172 rundll32.exe 81 PID 4172 wrote to memory of 1064 4172 rundll32.exe 81 PID 4172 wrote to memory of 1064 4172 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c57d4a710cf1c72dd7be4788338b6c0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c57d4a710cf1c72dd7be4788338b6c0_NeikiAnalytics.dll,#12⤵PID:1064
-