Analysis
-
max time kernel
133s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 11:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0cc2da3af6cd78cad86e38b9fbc01970_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0cc2da3af6cd78cad86e38b9fbc01970_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
0cc2da3af6cd78cad86e38b9fbc01970_NeikiAnalytics.dll
-
Size
268KB
-
MD5
0cc2da3af6cd78cad86e38b9fbc01970
-
SHA1
0423531c9032fe07f6ea252d3b7a76c47585b5fb
-
SHA256
59ce833da5979df99eaa7b24ce863f584c982473eaa6ff69a6c922f984c6ad23
-
SHA512
9962edf651cdffe72bf791e7b157847206be9849168dfa15f5ad8413dbc4403bd0a2eefe863ee1703bfc1accf18c34815a6d7de6bc9b62221aa62638168bbbee
-
SSDEEP
3072:tUVw6s7QkHs1jFLgqRzi414qcSeDBbiG3ufag3DYcC+3OhvFcKFHh0Oom/:tgPkM1xgqRG+igz5BA
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4424 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4424 2276 rundll32.exe 83 PID 2276 wrote to memory of 4424 2276 rundll32.exe 83 PID 2276 wrote to memory of 4424 2276 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc2da3af6cd78cad86e38b9fbc01970_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0cc2da3af6cd78cad86e38b9fbc01970_NeikiAnalytics.dll,#12⤵
- Suspicious use of SetWindowsHookEx
PID:4424
-