Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-06-2024 19:39
Static task
static1
Behavioral task
behavioral1
Sample
00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll
-
Size
297KB
-
MD5
855d05cf40b4305653216e0121c06560
-
SHA1
8fdeb127de018703a7941ce3d8d4e30ccdf09900
-
SHA256
00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243
-
SHA512
eb7e843ddbe4e762772ad821603fb5faefd738be94836b04519b0d3805030599f402fb547dbef86f394ff47f505d587be2a84d987a7d28ea9c0501c99d084030
-
SSDEEP
3072:EMjli0VyY2Od91zLCFSxC2KcJbsIOqw0nmFLPVsUeBTg4vRPo5xNt7+XNtUU/cc5:EYluOf1qUqc+pp0nmRPVsEk0k
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1848 2044 rundll32.exe 28 PID 2044 wrote to memory of 1848 2044 rundll32.exe 28 PID 2044 wrote to memory of 1848 2044 rundll32.exe 28 PID 2044 wrote to memory of 1848 2044 rundll32.exe 28 PID 2044 wrote to memory of 1848 2044 rundll32.exe 28 PID 2044 wrote to memory of 1848 2044 rundll32.exe 28 PID 2044 wrote to memory of 1848 2044 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll,#12⤵PID:1848
-