Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 04:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2eb64ac0eaa192bb3a73d89fdc150f30_NeikiAnalytics.dll
Resource
win7-20240221-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2eb64ac0eaa192bb3a73d89fdc150f30_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
1 signatures
150 seconds
General
-
Target
2eb64ac0eaa192bb3a73d89fdc150f30_NeikiAnalytics.dll
-
Size
9.0MB
-
MD5
2eb64ac0eaa192bb3a73d89fdc150f30
-
SHA1
c6f3d606ead4c98f298dbfd226b42013c3d20ca5
-
SHA256
6084457fa55d3a9dd708d8f56105ad163b2e4e9506dccffeb42a16373ed64085
-
SHA512
626f87bba34b2ee3557778765c0a3b8cc8e0330124b2810091bcdd3071102da276a883f03af68e9ec25b646e1f82fdde413a4b95f634fa473c0ad28d6843b43f
-
SSDEEP
196608:MDdWJQKiqdfwSqENZWS1xF7xl5V4/fF7YIaki:FJQ6dP3FFnVsfh/i
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3364 wrote to memory of 3272 3364 rundll32.exe 89 PID 3364 wrote to memory of 3272 3364 rundll32.exe 89 PID 3364 wrote to memory of 3272 3364 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2eb64ac0eaa192bb3a73d89fdc150f30_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2eb64ac0eaa192bb3a73d89fdc150f30_NeikiAnalytics.dll,#12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4140 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:4016