Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 19:39 UTC

General

  • Target

    00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll

  • Size

    297KB

  • MD5

    855d05cf40b4305653216e0121c06560

  • SHA1

    8fdeb127de018703a7941ce3d8d4e30ccdf09900

  • SHA256

    00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243

  • SHA512

    eb7e843ddbe4e762772ad821603fb5faefd738be94836b04519b0d3805030599f402fb547dbef86f394ff47f505d587be2a84d987a7d28ea9c0501c99d084030

  • SSDEEP

    3072:EMjli0VyY2Od91zLCFSxC2KcJbsIOqw0nmFLPVsUeBTg4vRPo5xNt7+XNtUU/cc5:EYluOf1qUqc+pp0nmRPVsEk0k

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\00e7fec0885c55cf15ea76d7fdbf8e4536bc1a9c4b726b594597ea22d4cbf243_NeikiAnalytics.dll,#1
      2⤵
        PID:1848

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.