Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 10:55
Behavioral task
behavioral1
Sample
5221522ec4f54c93e4574e06fcda0e90_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
5221522ec4f54c93e4574e06fcda0e90_NeikiAnalytics.dll
-
Size
68KB
-
MD5
5221522ec4f54c93e4574e06fcda0e90
-
SHA1
973a49bd0c87b3758e3e383b19f4ffb70cfcb670
-
SHA256
a9df2cd5c9058f776c394da85a8d859af6dc975824403ecb2923d7680738665f
-
SHA512
d050b1821fddd777ee96dc6d66addaa9af2b8cc5d3ce726ff84c893a3d8fc633c5321e8a86d0817d08a41a7e13d72ec03b8417aab677a65bf2aadb2c28d9ddf8
-
SSDEEP
1536:MLNd/Pk7btaoX7DypKr0wNHYIUSS9eyBF20iZs3k:GNhY5aora80mHYI7q2Xs3
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctsxpcki.exe rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1152 wrote to memory of 1772 1152 rundll32.exe 28 PID 1152 wrote to memory of 1772 1152 rundll32.exe 28 PID 1152 wrote to memory of 1772 1152 rundll32.exe 28 PID 1152 wrote to memory of 1772 1152 rundll32.exe 28 PID 1152 wrote to memory of 1772 1152 rundll32.exe 28 PID 1152 wrote to memory of 1772 1152 rundll32.exe 28 PID 1152 wrote to memory of 1772 1152 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5221522ec4f54c93e4574e06fcda0e90_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5221522ec4f54c93e4574e06fcda0e90_NeikiAnalytics.dll,#12⤵
- Drops startup file
PID:1772
-