Analysis
-
max time kernel
131s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 02:56
Static task
static1
Behavioral task
behavioral1
Sample
54bc01a4c418789e2bf19f3862e65f7f25ac6fe3ee436cd79802d172060b1246_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
54bc01a4c418789e2bf19f3862e65f7f25ac6fe3ee436cd79802d172060b1246_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
54bc01a4c418789e2bf19f3862e65f7f25ac6fe3ee436cd79802d172060b1246_NeikiAnalytics.dll
-
Size
165KB
-
MD5
253c5c9e17eb333b26d361e7fc5e7e80
-
SHA1
442ba1cb66df0121b489b2ed4c3453f3ca12ae25
-
SHA256
54bc01a4c418789e2bf19f3862e65f7f25ac6fe3ee436cd79802d172060b1246
-
SHA512
2a9ae437895a18ed99b6892a05895d6c098c685879adcc92b09630fb0681a7af536cf9178af0611c0ec9bc946f0d2a003db1fe8588349e9bb0bc7085faef21b1
-
SSDEEP
3072:9U+3BpslZzJtx6/4cYMPRPZ+4Px+hPXKMFBm7hp:9UkKtx6/4YPZ+zhPXKqm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 4456 4764 rundll32.exe 82 PID 4764 wrote to memory of 4456 4764 rundll32.exe 82 PID 4764 wrote to memory of 4456 4764 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54bc01a4c418789e2bf19f3862e65f7f25ac6fe3ee436cd79802d172060b1246_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54bc01a4c418789e2bf19f3862e65f7f25ac6fe3ee436cd79802d172060b1246_NeikiAnalytics.dll,#12⤵PID:4456
-