Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll
-
Size
23KB
-
MD5
883a0cda6c4fa788582e03a504286b10
-
SHA1
db2bd1c76c1308b5a20d72d089faa2e24711f1bc
-
SHA256
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321
-
SHA512
1b1376de74351dee7bbf347a58a5e0783ef13c93d1b450c30d6d45544ccf08b136f562650e8ca202c45603e038d47541589a4331b6aeab91d04af02406400e27
-
SSDEEP
384:bVmKXqKvJEh8gb43xsdPtQTuO1tgTZkzFS1895xdQdl6bQqnbGOfD/IkMiBLzN:bJvuh8gv/ALjQyFSs5LIlDSD/IkHzN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2172 1704 rundll32.exe 28 PID 1704 wrote to memory of 2172 1704 rundll32.exe 28 PID 1704 wrote to memory of 2172 1704 rundll32.exe 28 PID 1704 wrote to memory of 2172 1704 rundll32.exe 28 PID 1704 wrote to memory of 2172 1704 rundll32.exe 28 PID 1704 wrote to memory of 2172 1704 rundll32.exe 28 PID 1704 wrote to memory of 2172 1704 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll,#12⤵PID:2172
-