Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 00:37

General

  • Target

    706c96ef2f50e22a23524c700d8788a0_NeikiAnalytics.exe

  • Size

    76KB

  • MD5

    706c96ef2f50e22a23524c700d8788a0

  • SHA1

    7cf44ff9a24e173cb866fd5f70c2f0cfc8446b79

  • SHA256

    aa69c0e2a0bfc94d014b1fa0fac463d2c4db3b1998a19ac546f6124c2f0eeebe

  • SHA512

    4f105f09d199060ab788f6c67261ce3ad2bc9c20bf6cde9e6cfe6a7be58d6e6ba5da084fbf94b8af60da63fd5c1b5bb0254abd3696683468cd85829e77827ef2

  • SSDEEP

    1536:0d9dseIOcE93dIvYvZEyF4EEOF6N4yS+AQmZTl/5011:MdseIOKEZEyFjEOFqTiQm5l/5011

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\706c96ef2f50e22a23524c700d8788a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\706c96ef2f50e22a23524c700d8788a0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          PID:1956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    20e8bed9e68c38b88094f5f83c479997

    SHA1

    2d9dd064010a88b0eb2e4064306d03471c61f9b7

    SHA256

    8334c2c133b872ef3dfa01f8bed531f1f6c7b1d26478206925018bba2e7237b6

    SHA512

    f009588cba82af36b7f50fd7adee641d802c676c2b025d7f35f2479e519bad9f87a9bbfe74941468677398f0159876211d950606c1eba6c49ef67dc1e69674a0

  • \Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    76KB

    MD5

    f3bb2cb15f052ef337541416e2b818df

    SHA1

    854174c27427c16ffcb21d94ae7199b870a97dc9

    SHA256

    93ec7342cc4f1ea4dc2d18fc986c23151b7ebf48436d8dcf9eb47bd1a555783e

    SHA512

    c9484dd7bd1d2d8a80e49aab5ecc90eb60924f9246bbd5e09f2d88b77778b84b9b0429ad64ebb4f6215994237fc24fcd5556e18541d2847f99fe3efe7ba79764

  • \Windows\SysWOW64\omsecor.exe

    Filesize

    76KB

    MD5

    fe0a4105723cc43552e5f41bf64ebe51

    SHA1

    83bb927ea6500c603fefd3959f2d8d18cf31aecc

    SHA256

    19729763b77dd061dd94f74dd78073d16a2bfa7493bdda4fcb45e932e28a1485

    SHA512

    13faca7c45499833e11e4acd26118657b45a45bb1158df4adeb9534cd4ec932302a2a6153568ac481067b6abdfdacd8871335478ffe3cdf2c5ca0b70910656f6

  • memory/1956-40-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1956-37-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-17-0x0000000000370000-0x000000000039A000-memory.dmp

    Filesize

    168KB

  • memory/2120-24-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-12-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2120-11-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2220-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2220-8-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2276-25-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2276-34-0x00000000003A0000-0x00000000003CA000-memory.dmp

    Filesize

    168KB

  • memory/2276-35-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2276-39-0x00000000003A0000-0x00000000003CA000-memory.dmp

    Filesize

    168KB