Analysis
-
max time kernel
130s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
1bee2c2537f3268d014305428fb7f0c9aa2a14c3644e447d01908bcd29ca7ced_NeikiAnalytics.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1bee2c2537f3268d014305428fb7f0c9aa2a14c3644e447d01908bcd29ca7ced_NeikiAnalytics.dll
Resource
win10v2004-20240611-en
General
-
Target
1bee2c2537f3268d014305428fb7f0c9aa2a14c3644e447d01908bcd29ca7ced_NeikiAnalytics.dll
-
Size
5KB
-
MD5
adda4def5e06336420c9d1feaa102e40
-
SHA1
83f20a537afcd0311d3e1fdf53a018b22e59227e
-
SHA256
1bee2c2537f3268d014305428fb7f0c9aa2a14c3644e447d01908bcd29ca7ced
-
SHA512
b514b30977965576b4b8e5b1e6b70566cc532f099608857389af3b4876f91f8555b8a994c4fe5ce1a69c5e67f19f23f744ad9fcc81dc2fc45e9ef82b38ec1480
-
SSDEEP
48:CCy86+Wet9Q/iooHeiefhe+/lSMYEqlqNDsndSlXP/wyaqAvOjB+QkoPbu+9nlod:hy859x0P8MalawdU7AvOrhjmd
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2528 1652 rundll32.exe 82 PID 1652 wrote to memory of 2528 1652 rundll32.exe 82 PID 1652 wrote to memory of 2528 1652 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bee2c2537f3268d014305428fb7f0c9aa2a14c3644e447d01908bcd29ca7ced_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1bee2c2537f3268d014305428fb7f0c9aa2a14c3644e447d01908bcd29ca7ced_NeikiAnalytics.dll,#12⤵PID:2528
-