Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 19:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
430d4f187fb25db9b997c0570182d800_NeikiAnalytics.dll
Resource
win7-20240215-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
430d4f187fb25db9b997c0570182d800_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
430d4f187fb25db9b997c0570182d800_NeikiAnalytics.dll
-
Size
81KB
-
MD5
430d4f187fb25db9b997c0570182d800
-
SHA1
f551b5eafb08946482836a780d29b36269d4831f
-
SHA256
8a1fc1e88f418372ce1dd6f847f0a8b432e7aea72bc1af73945ed1b9942bab4a
-
SHA512
3c7b53e2bff52f6e6f593dd8c5974230bb95b6db69c01a45caa41df1a0c010801574fceea846b05e3b2ec74e97f5f5d74efc9679ffd8d7d0f1f208f4e2e4852b
-
SSDEEP
1536:MtByXv7uWGEqXZKXTadSp7Lxw9zzBPw+iASUSFOj8sWHcdF7zenq8Wn:M4v4JKXTx71w0ArSsXF3enq8Wn
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4332 4388 rundll32.exe 83 PID 4388 wrote to memory of 4332 4388 rundll32.exe 83 PID 4388 wrote to memory of 4332 4388 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\430d4f187fb25db9b997c0570182d800_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\430d4f187fb25db9b997c0570182d800_NeikiAnalytics.dll,#12⤵PID:4332
-