Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:41
Behavioral task
behavioral1
Sample
9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe
Resource
win7-20240221-en
General
-
Target
9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe
-
Size
88KB
-
MD5
9820d839f42f4f2e9ea4d7957cd24d30
-
SHA1
0760bcc46ad9b2d3bc1f74323fe7049c26310882
-
SHA256
28706a55c8770d5ce4bd44669c6cd1deb059bfe4b2189324a23d8c488972a61f
-
SHA512
fac4bf4de9c07477d8ad29edacc2b5a1feaf8e097b2a1fbedaa9b933b5b2e7f8799df61f370f76c1610b541e02e07b5df6581aff1a12c97d4abdb3e38777d40a
-
SSDEEP
1536:1d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:9dseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1716 omsecor.exe 2464 omsecor.exe 2380 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1032 9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe 1032 9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe 1716 omsecor.exe 1716 omsecor.exe 2464 omsecor.exe 2464 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1716 1032 9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe 28 PID 1032 wrote to memory of 1716 1032 9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe 28 PID 1032 wrote to memory of 1716 1032 9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe 28 PID 1032 wrote to memory of 1716 1032 9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe 28 PID 1716 wrote to memory of 2464 1716 omsecor.exe 32 PID 1716 wrote to memory of 2464 1716 omsecor.exe 32 PID 1716 wrote to memory of 2464 1716 omsecor.exe 32 PID 1716 wrote to memory of 2464 1716 omsecor.exe 32 PID 2464 wrote to memory of 2380 2464 omsecor.exe 33 PID 2464 wrote to memory of 2380 2464 omsecor.exe 33 PID 2464 wrote to memory of 2380 2464 omsecor.exe 33 PID 2464 wrote to memory of 2380 2464 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\9820d839f42f4f2e9ea4d7957cd24d30_NEIKI.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2380
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5730edaddfe34291e9c89447a0c395328
SHA16ce3466be761ab4e5a3ef4c7f5f6a8ecba743afe
SHA256122ec055d1d4cac370002db741196f74b1b72dff8349bb4cf6b37512bf6610de
SHA5121b8d0feed8ea972dce270029cc173feb6808f64de76687f6d3e38d6a86148e4e7aff6b260a099edc54be782c7a7d50163feb7a1113a4da78dbf1615d4959b16b
-
Filesize
88KB
MD50ff174c3caba986773fb7a0634ac70a5
SHA135f69714fe956abe1265a7692938b089828a3b6d
SHA256b51c6afd0f52d1e43765e8814806fdeecf4e751006d3481afb115fa34a07355d
SHA512134707939ac3ebe412c4ad13fae42ac4bc1f1a2e898d888d4600a56118110d9bcbd0493ddfa2e20ac2e04271226fb6488af2dc17fbedc2d3cebb5e40be48f1cf
-
Filesize
88KB
MD52a31489f8ab65074b28a99cf1579417b
SHA1074a227fccf23493dbd16f90c601c9851a380ef1
SHA256cec4ee3175877a389a083781acf5ce1c99ec52b26db2351ff66be4fff08bc872
SHA512db53f56730384fb6b8c150eebaed904e3aaf9a2dab4ee6dc86376a5101e930db6b47a7dfdea75864246f64bd416bff8d1cab3d0245437a102683371efd6badde