Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 01:49
Static task
static1
Behavioral task
behavioral1
Sample
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll
-
Size
23KB
-
MD5
883a0cda6c4fa788582e03a504286b10
-
SHA1
db2bd1c76c1308b5a20d72d089faa2e24711f1bc
-
SHA256
5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321
-
SHA512
1b1376de74351dee7bbf347a58a5e0783ef13c93d1b450c30d6d45544ccf08b136f562650e8ca202c45603e038d47541589a4331b6aeab91d04af02406400e27
-
SSDEEP
384:bVmKXqKvJEh8gb43xsdPtQTuO1tgTZkzFS1895xdQdl6bQqnbGOfD/IkMiBLzN:bJvuh8gv/ALjQyFSs5LIlDSD/IkHzN
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4860 wrote to memory of 4156 4860 rundll32.exe 81 PID 4860 wrote to memory of 4156 4860 rundll32.exe 81 PID 4860 wrote to memory of 4156 4860 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5e7ad6352e3e589512b827785d45f6e2b236b08fce94b83d95b4f5a1650aa321_NeikiAnalytics.dll,#12⤵PID:4156
-