Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 03:53
Behavioral task
behavioral1
Sample
5c2cb7bbb91e7091da1fc30d993d7070_NeikiAnalytics.dll
Resource
win7-20240611-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
5c2cb7bbb91e7091da1fc30d993d7070_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
5c2cb7bbb91e7091da1fc30d993d7070_NeikiAnalytics.dll
-
Size
76KB
-
MD5
5c2cb7bbb91e7091da1fc30d993d7070
-
SHA1
c2a35654f156dcede47830bcaca9a41d6608b557
-
SHA256
1042c0a42bbfc5c66c90a5c09c2205a665a4cb5fac04623cb1c1a05dab9fd2da
-
SHA512
eee0711d6f47963fa79cf033b354cb3c90ba180f8cacaf2c5d31a9f8fb50d4daf4cbe1235e97c882d4e39b1015baf1373dbd006518e6cab92aa7dc21ab6049db
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZfqdcmHSbRAe:c8y93KQjy7G55riF1cMo03hqdcmHe
Score
8/10
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral2/memory/920-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/920-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2864 920 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 920 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4212 wrote to memory of 920 4212 rundll32.exe 82 PID 4212 wrote to memory of 920 4212 rundll32.exe 82 PID 4212 wrote to memory of 920 4212 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c2cb7bbb91e7091da1fc30d993d7070_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c2cb7bbb91e7091da1fc30d993d7070_NeikiAnalytics.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 7123⤵
- Program crash
PID:2864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 920 -ip 9201⤵PID:4564