Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 04:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1f9115156ccd0ef14799607944419440_NeikiAnalytics.dll
Resource
win7-20240611-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
1f9115156ccd0ef14799607944419440_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
1 signatures
150 seconds
General
-
Target
1f9115156ccd0ef14799607944419440_NeikiAnalytics.dll
-
Size
5KB
-
MD5
1f9115156ccd0ef14799607944419440
-
SHA1
14a07437034bac112ec72df4725f8868f6af2d25
-
SHA256
919573847b189c3d95d7f492a5ef73450a040d1f9512f563f268fa5557ca916b
-
SHA512
46bdca47e3df878723364567a849c44be57353d5ae72c63a6cd5f55bb2c0b415c199f0b218ff5b302003d26acec0046f0489ce4f064a076c063f5935af41a8a1
-
SSDEEP
96:nEY2RrF1eqwi4eLoYY4/YQdQungGBGIanGNG:EHRh1eppOHAQKwgGBGbD
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4020 1564 rundll32.exe 82 PID 1564 wrote to memory of 4020 1564 rundll32.exe 82 PID 1564 wrote to memory of 4020 1564 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f9115156ccd0ef14799607944419440_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f9115156ccd0ef14799607944419440_NeikiAnalytics.dll,#12⤵PID:4020
-