Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 22:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06d9d8cedde716878e768d521aa87a90_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
06d9d8cedde716878e768d521aa87a90_NeikiAnalytics.dll
-
Size
2.0MB
-
MD5
06d9d8cedde716878e768d521aa87a90
-
SHA1
dea82eab5371e5d2bedef30eaa8fab7e06cb0288
-
SHA256
99f11de265b93fb5ea9178319536a6b9c2330319055dfde4c3ff00290e1bc6a8
-
SHA512
7e895140f041c05ea167545a3786ce32ef2f4a9315160d8407a694cb54b5caf5b2353fe1eadcbca4159f38bc1afbd2658248b62b98f78a2d7aed0e7155617c84
-
SSDEEP
49152:WqnwXmwq3aDqKoq1axl+h2Y8L0CPvdvs3P2mY8f2IGgi:SmwZDqKoq1ao78L0CPvdgumLBTi
Malware Config
Signatures
-
Detect Blackmoon payload 3 IoCs
resource yara_rule behavioral1/memory/640-12-0x0000000010000000-0x00000000104DC000-memory.dmp family_blackmoon behavioral1/memory/640-15-0x0000000010000000-0x00000000104DC000-memory.dmp family_blackmoon behavioral1/memory/640-14-0x0000000010000000-0x00000000104DC000-memory.dmp family_blackmoon -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28 PID 1932 wrote to memory of 640 1932 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06d9d8cedde716878e768d521aa87a90_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06d9d8cedde716878e768d521aa87a90_NeikiAnalytics.dll,#12⤵PID:640
-