Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 23:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8437b23e8ffce6484b927a0e2a95b750_NeikiAnalytics.dll
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
General
-
Target
8437b23e8ffce6484b927a0e2a95b750_NeikiAnalytics.dll
-
Size
1.2MB
-
MD5
8437b23e8ffce6484b927a0e2a95b750
-
SHA1
32d4c388349039f4a6e4ea2cbffd406b280ebfd8
-
SHA256
db2f4547987263ee214513d03b4414130e91894807afec7da08cbdb95ba4269f
-
SHA512
df7b17e695c017a04c0098d45c95500740f1b73af1dce690db982ebd6bf988decf91200060188d7efbb3d8e16279bc0d1063563ea4092e6e3742df1726bedaf6
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0w:jDgtfRQUHPw06MoV2nwTBlhm84
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3868 2856 rundll32.exe 82 PID 2856 wrote to memory of 3868 2856 rundll32.exe 82 PID 2856 wrote to memory of 3868 2856 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8437b23e8ffce6484b927a0e2a95b750_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8437b23e8ffce6484b927a0e2a95b750_NeikiAnalytics.dll,#12⤵PID:3868
-