Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 00:17
Behavioral task
behavioral1
Sample
2650e50ec48b43f5e8c1e711d1b2c9c0d42021f645831030ad727889df19abcb_NeikiAnalytics.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2650e50ec48b43f5e8c1e711d1b2c9c0d42021f645831030ad727889df19abcb_NeikiAnalytics.dll
Resource
win10v2004-20240226-en
General
-
Target
2650e50ec48b43f5e8c1e711d1b2c9c0d42021f645831030ad727889df19abcb_NeikiAnalytics.dll
-
Size
76KB
-
MD5
0166b20a732f9ed946b323d11d8957c0
-
SHA1
69a8b27904829f131c598b55437ef770dda0240e
-
SHA256
2650e50ec48b43f5e8c1e711d1b2c9c0d42021f645831030ad727889df19abcb
-
SHA512
b65e5447a83391848efeb68853d5e855f2b989c1c7196cf4b201749a1b49747e6a27f041cf74dc8d68906b43b4cabe40b619a0acfa55dd8bf9b71038191c0ed8
-
SSDEEP
1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZK05iL3xLChg4:c8y93KQjy7G55riF1cMo0361Chl
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4836-0-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4836-1-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral2/memory/4836-2-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2196 4836 WerFault.exe 89 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4836 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4836 4064 rundll32.exe 89 PID 4064 wrote to memory of 4836 4064 rundll32.exe 89 PID 4064 wrote to memory of 4836 4064 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2650e50ec48b43f5e8c1e711d1b2c9c0d42021f645831030ad727889df19abcb_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2650e50ec48b43f5e8c1e711d1b2c9c0d42021f645831030ad727889df19abcb_NeikiAnalytics.dll,#12⤵
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 6723⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4836 -ip 48361⤵PID:1188
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2128 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:2504