Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 08:33 UTC

General

  • Target

    8c4194f27ab1d927e457a5c2cf295d3b859d5a6b00bbb255585ade3bb1718918_NeikiAnalytics.dll

  • Size

    6KB

  • MD5

    2bedee6632b8b0086b91ea9d812d7c80

  • SHA1

    0ed5d3e5e4d7631c65cd558c8d3dd3a392266c93

  • SHA256

    8c4194f27ab1d927e457a5c2cf295d3b859d5a6b00bbb255585ade3bb1718918

  • SHA512

    9f59d1113315700d1e1e18b67d42fbad12dd8290c220be69ea0cd93896feb887052b7b81fc05186a6e0d49ff3e996a0bf5d6c283ad1edd5cbc0b49a7c4ef4757

  • SSDEEP

    48:63mll5YVOa9VUX1iwbQWu0fB+BDq9J5SH:VDa9VUX9bQW/B+FqX5SH

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8c4194f27ab1d927e457a5c2cf295d3b859d5a6b00bbb255585ade3bb1718918_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8c4194f27ab1d927e457a5c2cf295d3b859d5a6b00bbb255585ade3bb1718918_NeikiAnalytics.dll,#1
      2⤵
        PID:1800

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.