Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 04:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3d45b66627dac30d2d2cec41286e3fb4605f2f02008fd6a9f2320f9f270248f6_NeikiAnalytics.dll
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
General
-
Target
3d45b66627dac30d2d2cec41286e3fb4605f2f02008fd6a9f2320f9f270248f6_NeikiAnalytics.dll
-
Size
918KB
-
MD5
4680426dd58d30fb767bd8fe21871bb0
-
SHA1
6ee4492c4d900290a4b2f98f226345beaaf6f0f5
-
SHA256
3d45b66627dac30d2d2cec41286e3fb4605f2f02008fd6a9f2320f9f270248f6
-
SHA512
b46c872dd06232c29d86ef2839edfdb513036d6d7dde3db698316b98e4683053d9c712d3c5cd5e4f783803dc3b7189fda88a8c3afa0db5789b307c215dbccd26
-
SSDEEP
6144:jDgtfRQUHPw06MoV2nwTBlhm8zDgtfRQUHPw06MoV2nwTBlhm8b:jDgN6MoIwT3vDgN6MoIwT3/
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2044 wrote to memory of 624 2044 rundll32.exe 82 PID 2044 wrote to memory of 624 2044 rundll32.exe 82 PID 2044 wrote to memory of 624 2044 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d45b66627dac30d2d2cec41286e3fb4605f2f02008fd6a9f2320f9f270248f6_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3d45b66627dac30d2d2cec41286e3fb4605f2f02008fd6a9f2320f9f270248f6_NeikiAnalytics.dll,#12⤵PID:624
-