Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe
-
Size
96KB
-
MD5
67b92e9d81218abcc1bbd6c5aee495c0
-
SHA1
50be30b183c6276521c4d9349c694fa7e78cdd0c
-
SHA256
69728bf9129f7172efd3f4170a965eabaf6f0f14f9b1cb83641e657a09fc775d
-
SHA512
f4f35fbd012d9de47f790e38039384c7378fb9e1e882762321f9d01fccb95067ec410f5efbf64b75a92c6da2c4eb2174813c5babdc147025c38883e80f2c964d
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:UGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2760 omsecor.exe 1656 omsecor.exe 2904 omsecor.exe 308 omsecor.exe 884 omsecor.exe 2880 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2420 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 2420 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 2760 omsecor.exe 1656 omsecor.exe 1656 omsecor.exe 308 omsecor.exe 308 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2208 set thread context of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2760 set thread context of 1656 2760 omsecor.exe 30 PID 2904 set thread context of 308 2904 omsecor.exe 35 PID 884 set thread context of 2880 884 omsecor.exe 37 -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2208 wrote to memory of 2420 2208 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 28 PID 2420 wrote to memory of 2760 2420 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 29 PID 2420 wrote to memory of 2760 2420 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 29 PID 2420 wrote to memory of 2760 2420 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 29 PID 2420 wrote to memory of 2760 2420 67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe 29 PID 2760 wrote to memory of 1656 2760 omsecor.exe 30 PID 2760 wrote to memory of 1656 2760 omsecor.exe 30 PID 2760 wrote to memory of 1656 2760 omsecor.exe 30 PID 2760 wrote to memory of 1656 2760 omsecor.exe 30 PID 2760 wrote to memory of 1656 2760 omsecor.exe 30 PID 2760 wrote to memory of 1656 2760 omsecor.exe 30 PID 1656 wrote to memory of 2904 1656 omsecor.exe 34 PID 1656 wrote to memory of 2904 1656 omsecor.exe 34 PID 1656 wrote to memory of 2904 1656 omsecor.exe 34 PID 1656 wrote to memory of 2904 1656 omsecor.exe 34 PID 2904 wrote to memory of 308 2904 omsecor.exe 35 PID 2904 wrote to memory of 308 2904 omsecor.exe 35 PID 2904 wrote to memory of 308 2904 omsecor.exe 35 PID 2904 wrote to memory of 308 2904 omsecor.exe 35 PID 2904 wrote to memory of 308 2904 omsecor.exe 35 PID 2904 wrote to memory of 308 2904 omsecor.exe 35 PID 308 wrote to memory of 884 308 omsecor.exe 36 PID 308 wrote to memory of 884 308 omsecor.exe 36 PID 308 wrote to memory of 884 308 omsecor.exe 36 PID 308 wrote to memory of 884 308 omsecor.exe 36 PID 884 wrote to memory of 2880 884 omsecor.exe 37 PID 884 wrote to memory of 2880 884 omsecor.exe 37 PID 884 wrote to memory of 2880 884 omsecor.exe 37 PID 884 wrote to memory of 2880 884 omsecor.exe 37 PID 884 wrote to memory of 2880 884 omsecor.exe 37 PID 884 wrote to memory of 2880 884 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\67b92e9d81218abcc1bbd6c5aee495c0_NeikiAnalytics.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
PID:2880
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ee3034f4f280ff4246ec4ab40b5bcdce
SHA1dd1c434d4bf39054884df035d9a8090b2ae0fefa
SHA2564af1558eeb46f5bd5010a1f6de81336a023a3dd45e364c4333d0061fc080fbf7
SHA512bd9674dba279f001e518673b6124e56a9698825629bdba8be0acb9625429289784fa789d560270e3f5587641eb1b5fcc62d98b8b40ea919dbaee7258ed08066a
-
Filesize
96KB
MD540f92d4b929c2d7564f9cacd803ef508
SHA16893941b611b4109517013940444da046041d668
SHA2562acf30aa7dbe48bfecfec7cbf7ff9dab669a793fdb760e1280a8ba3a6cf31de0
SHA512e63f4d2f4e5216e20bd8c38a125a27d43dbdc3a64a9ec02a1362a4787d59a63a1b6a6ab515c58d60555c1429c475e023c153d546dd8986fe108b834a1f866cab
-
Filesize
96KB
MD564ed8427ad31d5ad98e421be7c868307
SHA1b8e5055272510d667c288f823b6d9a4b20d37934
SHA25646954c1b80e832e2924391bf77de7dad536686acf44052d974141c4534a9e130
SHA512472a3ce2578a65bef1be2fefef8cca93c7c385afdf3f804387f4580008a7a50efef646768a4a2e6d590a2da349a33476c73496c52aefb2f04351e6489552be5f