Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 00:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
208afe11d090613ccc97a7552e372900_NeikiAnalytics.dll
Resource
win7-20240220-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
208afe11d090613ccc97a7552e372900_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
208afe11d090613ccc97a7552e372900_NeikiAnalytics.dll
-
Size
6KB
-
MD5
208afe11d090613ccc97a7552e372900
-
SHA1
b95ae4df184aefefa0e096868fc483219b178961
-
SHA256
7f1571bd978d51a5c227f84218e65bfa11312977db69c5ed338e7523725d54d8
-
SHA512
b6b110098ed2950fe07dd548682f0c41cd822f948bf39f325981811c9fd62ac1aeee5b471a668859084feb84769849b30cd4c234a02623891a93cd6d219117a1
-
SSDEEP
192:EHRh1epp5dgzbszqZMrAWijGadbSllb221n9mp:EHROnuEzqZgi6adbS/b2299
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1732 wrote to memory of 624 1732 rundll32.exe 82 PID 1732 wrote to memory of 624 1732 rundll32.exe 82 PID 1732 wrote to memory of 624 1732 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\208afe11d090613ccc97a7552e372900_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\208afe11d090613ccc97a7552e372900_NeikiAnalytics.dll,#12⤵PID:624
-