Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 19:29

General

  • Target

    b8d7d3726584b35b5854189cc75d7dd9b54cd554207ace68f6f8b18e61d94925_NeikiAnalytics.dll

  • Size

    869KB

  • MD5

    e9aa252c07ab3a153da72b74e635e1a0

  • SHA1

    d305108bd0e431874f372bcdce2e72f9594addb9

  • SHA256

    b8d7d3726584b35b5854189cc75d7dd9b54cd554207ace68f6f8b18e61d94925

  • SHA512

    26180c950b78a90934aecafa98b4a5168ab631e7010850774116cf2f106933732d992fe77a5c0e71c0c55f251001cc78a35d6365277ce0233057c7642315f26b

  • SSDEEP

    24576:q8iLtCk9W+D7/t1YyI1YyIZ0eCbC+xwp9xwp9dcV6E/Zky8LzHBmW6:q8iLtCUD7/t1YyI1YyIZ0eCbC+xwp9xT

Score
1/10

Malware Config

Signatures

  • Modifies registry class 55 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\b8d7d3726584b35b5854189cc75d7dd9b54cd554207ace68f6f8b18e61d94925_NeikiAnalytics.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\b8d7d3726584b35b5854189cc75d7dd9b54cd554207ace68f6f8b18e61d94925_NeikiAnalytics.dll
      2⤵
      • Modifies registry class
      PID:2188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2188-0-0x00000000100C2000-0x00000000100E5000-memory.dmp

    Filesize

    140KB