Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
a03bdb12e59512493c54d45cd5c247a49626a4d5a493ec856bcebf1b9d7f8c1e_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a03bdb12e59512493c54d45cd5c247a49626a4d5a493ec856bcebf1b9d7f8c1e_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
a03bdb12e59512493c54d45cd5c247a49626a4d5a493ec856bcebf1b9d7f8c1e_NeikiAnalytics.dll
-
Size
315KB
-
MD5
2f6253298ace71c9ca4e0572668d4ce0
-
SHA1
1e2d431e5fb3001b9d463765644e72aec2908087
-
SHA256
a03bdb12e59512493c54d45cd5c247a49626a4d5a493ec856bcebf1b9d7f8c1e
-
SHA512
f739e4c8139ca4cdb4f34ff234cb26f12b9b014e4ed8b6ff1a02d3438273cb67446c2c91b6a37f30a3e33e46dea4443ee020e9bbba99a2947e68aacc8c594253
-
SSDEEP
6144:oLfYdl/SvGyaV/Jt1d/7wm3BhWgmzw7RCT4Fi2jLu7TjGek5Ii+i+ZzQSWXDjYUB:Ywl/KgRT33Bh9p12482G7TU5DF6zJWTB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2944 wrote to memory of 796 2944 rundll32.exe 28 PID 2944 wrote to memory of 796 2944 rundll32.exe 28 PID 2944 wrote to memory of 796 2944 rundll32.exe 28 PID 2944 wrote to memory of 796 2944 rundll32.exe 28 PID 2944 wrote to memory of 796 2944 rundll32.exe 28 PID 2944 wrote to memory of 796 2944 rundll32.exe 28 PID 2944 wrote to memory of 796 2944 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a03bdb12e59512493c54d45cd5c247a49626a4d5a493ec856bcebf1b9d7f8c1e_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a03bdb12e59512493c54d45cd5c247a49626a4d5a493ec856bcebf1b9d7f8c1e_NeikiAnalytics.dll,#12⤵PID:796
-