Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 06:15
Static task
static1
Behavioral task
behavioral1
Sample
3df55804a850e12b2558859afe819da0_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3df55804a850e12b2558859afe819da0_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
3df55804a850e12b2558859afe819da0_NeikiAnalytics.dll
-
Size
6.3MB
-
MD5
3df55804a850e12b2558859afe819da0
-
SHA1
80bc8c1080b10fbd2a81484a5e10947f0d6b7c50
-
SHA256
2043db4aed8b86c7b5bd9588b2058f6ef926b09de67b35661faea05ce5b07648
-
SHA512
ffa84058a4ce7888f38260c4232f5ed6008378f053eef01e8f03166f5e6d9efd693843ec9fcc7dca6f335a525ea78a01e22458e48efacec7698da8b278068a75
-
SSDEEP
98304:P9yg7ddrXClutmwFgj+OU0mnpB//5/14UUQEvNDHzg8gKiACNuMVh8dA:P4g7dBCamwmj+HnpREbvK8gKibg8h
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 4 2720 rundll32.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2460 wrote to memory of 2720 2460 rundll32.exe 28 PID 2720 wrote to memory of 2764 2720 rundll32.exe 30 PID 2720 wrote to memory of 2764 2720 rundll32.exe 30 PID 2720 wrote to memory of 2764 2720 rundll32.exe 30 PID 2720 wrote to memory of 2764 2720 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3df55804a850e12b2558859afe819da0_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3df55804a850e12b2558859afe819da0_NeikiAnalytics.dll,#12⤵
- Blocklisted process makes network request
- Checks BIOS information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\schtasks.exeschtasks /DELETE /F /TN "txLgMXpZxlPdyDsxr"3⤵PID:2764
-
-