Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
4ea27cebeaa3ab3a5667dcb1f45cf6be823abfa30527979758ebf47529829ae7_NeikiAnalytics.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ea27cebeaa3ab3a5667dcb1f45cf6be823abfa30527979758ebf47529829ae7_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
4ea27cebeaa3ab3a5667dcb1f45cf6be823abfa30527979758ebf47529829ae7_NeikiAnalytics.dll
-
Size
41KB
-
MD5
a93d6de47d74ef0bcfa7fb1aec67fc00
-
SHA1
d8f438edb90d60a58fc2cb7898cdf5bb002a230a
-
SHA256
4ea27cebeaa3ab3a5667dcb1f45cf6be823abfa30527979758ebf47529829ae7
-
SHA512
c0d894a8b0a8301d7d92d925af6f66336c986f747a9e12dc43b5fb3f6e88b5250d1766735a5a739437fcfefb20647939ba86c0f15db44914513f4af3f164591d
-
SSDEEP
768:Jij6aQqOSMaIWSwHTIfKfs8m714VmYZOnH9EpYinAMxC2oQw:YdQqNvTeKm1cm/nH27HxC2oR
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 4416 4412 rundll32.exe 83 PID 4412 wrote to memory of 4416 4412 rundll32.exe 83 PID 4412 wrote to memory of 4416 4412 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ea27cebeaa3ab3a5667dcb1f45cf6be823abfa30527979758ebf47529829ae7_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ea27cebeaa3ab3a5667dcb1f45cf6be823abfa30527979758ebf47529829ae7_NeikiAnalytics.dll,#12⤵PID:4416
-