Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
07a0fe3fda19514c5ea27b010a813b4a9c7a01acecf0026dcdc271f39e9c4cb1_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
07a0fe3fda19514c5ea27b010a813b4a9c7a01acecf0026dcdc271f39e9c4cb1_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
07a0fe3fda19514c5ea27b010a813b4a9c7a01acecf0026dcdc271f39e9c4cb1_NeikiAnalytics.dll
-
Size
5KB
-
MD5
42d8856c83dd0ff65c234a6aa57aa110
-
SHA1
5a500e08ec008d6af7c283118951ed7615163992
-
SHA256
07a0fe3fda19514c5ea27b010a813b4a9c7a01acecf0026dcdc271f39e9c4cb1
-
SHA512
a0b002e69d5fa946c509bc274adeeba4a0d80200881471060bed30a641db26a0a72d4df188afca024cfdf419b7d4f1c99d209be2d784ffd2d2f82d956afc9a08
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqlKrn62nVOacIcGkRf8HOwO3WPms4/3M:hy859x0P8MalKrUIG2NDu
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1916 wrote to memory of 3004 1916 rundll32.exe 28 PID 1916 wrote to memory of 3004 1916 rundll32.exe 28 PID 1916 wrote to memory of 3004 1916 rundll32.exe 28 PID 1916 wrote to memory of 3004 1916 rundll32.exe 28 PID 1916 wrote to memory of 3004 1916 rundll32.exe 28 PID 1916 wrote to memory of 3004 1916 rundll32.exe 28 PID 1916 wrote to memory of 3004 1916 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a0fe3fda19514c5ea27b010a813b4a9c7a01acecf0026dcdc271f39e9c4cb1_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07a0fe3fda19514c5ea27b010a813b4a9c7a01acecf0026dcdc271f39e9c4cb1_NeikiAnalytics.dll,#12⤵PID:3004
-