Analysis
-
max time kernel
52s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 20:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4229b9faedb928895547786a07d82000_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
4229b9faedb928895547786a07d82000_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
4229b9faedb928895547786a07d82000_NeikiAnalytics.dll
-
Size
3KB
-
MD5
4229b9faedb928895547786a07d82000
-
SHA1
100f763577ee98ae9909031889c4f3fe44e52df3
-
SHA256
7e553df45b1a0a39d4b72e0a85b7b0f73d43fcb9a32e99abf19a6934702b90c5
-
SHA512
3e32ea6a283d2e79ed66627e55bd5ec4b33c8c87e638affd48f5b1ca1bc190f358c1185352aeaf8637aae9a5c4bb9ca0b2e1b71e236cc5ff8c9d795794b35393
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4140 wrote to memory of 4136 4140 rundll32.exe 83 PID 4140 wrote to memory of 4136 4140 rundll32.exe 83 PID 4140 wrote to memory of 4136 4140 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4229b9faedb928895547786a07d82000_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4229b9faedb928895547786a07d82000_NeikiAnalytics.dll,#12⤵PID:4136
-