Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 12:08
Static task
static1
Behavioral task
behavioral1
Sample
7007b5f4992a3bb2ca89cc7d8834309e9da515d2245f35f07592a7d7567cea81_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7007b5f4992a3bb2ca89cc7d8834309e9da515d2245f35f07592a7d7567cea81_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
7007b5f4992a3bb2ca89cc7d8834309e9da515d2245f35f07592a7d7567cea81_NeikiAnalytics.dll
-
Size
6KB
-
MD5
e6fb15e4e41a6dce07dff00e74238cb0
-
SHA1
51fd7dae6025bc2bb26df92145ef3b1f601b1f69
-
SHA256
7007b5f4992a3bb2ca89cc7d8834309e9da515d2245f35f07592a7d7567cea81
-
SHA512
2b4babdc2e0053313d11f44a51d44f444f74a0a769b9f775b306e06dc95a3ca4451f0667c8ab2962dcecbc88be31cc571106a3d3483e3d38009d3262a0456e71
-
SSDEEP
48:6EQt5YVOSVVEPy+wEMmqiHNpU10KB+BDq9J5SV3DY:CSVVEPozmB74B+FqX5S1D
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4516 wrote to memory of 752 4516 rundll32.exe 83 PID 4516 wrote to memory of 752 4516 rundll32.exe 83 PID 4516 wrote to memory of 752 4516 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7007b5f4992a3bb2ca89cc7d8834309e9da515d2245f35f07592a7d7567cea81_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7007b5f4992a3bb2ca89cc7d8834309e9da515d2245f35f07592a7d7567cea81_NeikiAnalytics.dll,#12⤵PID:752
-