Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 19:39

General

  • Target

    00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll

  • Size

    297KB

  • MD5

    855d05cf40b4305653216e0121c06560

  • SHA1

    8fdeb127de018703a7941ce3d8d4e30ccdf09900

  • SHA256

    00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243

  • SHA512

    eb7e843ddbe4e762772ad821603fb5faefd738be94836b04519b0d3805030599f402fb547dbef86f394ff47f505d587be2a84d987a7d28ea9c0501c99d084030

  • SSDEEP

    3072:EMjli0VyY2Od91zLCFSxC2KcJbsIOqw0nmFLPVsUeBTg4vRPo5xNt7+XNtUU/cc5:EYluOf1qUqc+pp0nmRPVsEk0k

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll,#1
      2⤵
        PID:1848

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads