Malware Analysis Report

2024-11-16 13:01

Sample ID 240520-gzjzcafa94
Target c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe
SHA256 2049fae0e816dd8535ff4a5741a4c756aad67d3c8f3bdff1388a64936bb40ca1
Tags
neconyd trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2049fae0e816dd8535ff4a5741a4c756aad67d3c8f3bdff1388a64936bb40ca1

Threat Level: Known bad

The file c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

neconyd trojan

Neconyd family

Neconyd

Loads dropped DLL

Executes dropped EXE

Drops file in System32 directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-20 06:14

Signatures

Neconyd family

neconyd

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-20 06:14

Reported

2024-05-20 06:17

Platform

win7-20240508-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2068 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2068 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2068 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2068 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2176 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2176 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2176 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2176 wrote to memory of 1752 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 1752 wrote to memory of 1832 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 1752 wrote to memory of 1832 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 1752 wrote to memory of 1832 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 1752 wrote to memory of 1832 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 86721caf55312093a96bbc9c93391b07
SHA1 99b36d00be3af7ce775824f3aa49c3f8cd6bc382
SHA256 52af109af3ccfaf95f1284e0ef659c6e379080b558dbd096bf3e4c8064b8e6da
SHA512 4d81fb2639836513c00a34e7803c1838ae43dc6b179d7f802c24dd98bb7da3cca6ad6fcb0664743a18fd09893a0cf0d2a1cda452770a67db4f2ea52200aaf6e8

\Windows\SysWOW64\omsecor.exe

MD5 4253861b8f458ec98f099919ecfef6ab
SHA1 77eef3889ee2005c998d7f2ce187da61f513379b
SHA256 5a77527622b9095bdadb6f81c75c50c55c8c8a25ab83198c203730942ef2421b
SHA512 fed9294229865f018ca790d4c1a3076bd6810a55b2ba637f09106f318acd8ce8154a5a617fdb1a1f702445ca791cbda353ace03870130da7ca1da3d624e52a6f

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 8a738c7474431d9afe188839535612bc
SHA1 494275f83679f5015a8ac4e2864497e41bc9cefe
SHA256 71cefe3354cfdf65e0d9117037f42bfc079405c6fa55061acf96bbcd8e695be8
SHA512 f88db01fb520d30c0a3bdc05603a8b396db4d8f65a80d0b5345ad9eb73ba5d8cb467d97725b0baaff87b6e6f16feb1499c269c47e91efe57691fca95884744f1

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-20 06:14

Reported

2024-05-20 06:17

Platform

win10v2004-20240426-en

Max time kernel

146s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\c217dc2771eccec57d3517399278b380_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
BE 88.221.83.200:443 www.bing.com tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 200.83.221.88.in-addr.arpa udp
BE 88.221.83.200:443 www.bing.com tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 73.91.225.64.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
US 8.8.8.8:53 102.124.91.35.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 86721caf55312093a96bbc9c93391b07
SHA1 99b36d00be3af7ce775824f3aa49c3f8cd6bc382
SHA256 52af109af3ccfaf95f1284e0ef659c6e379080b558dbd096bf3e4c8064b8e6da
SHA512 4d81fb2639836513c00a34e7803c1838ae43dc6b179d7f802c24dd98bb7da3cca6ad6fcb0664743a18fd09893a0cf0d2a1cda452770a67db4f2ea52200aaf6e8

C:\Windows\SysWOW64\omsecor.exe

MD5 8b1a6fae3c4120dfa5902bb722e5373e
SHA1 ad61e7e1e96c104bc12a4fb5f5847484566da5ad
SHA256 efee8ac0b393ae9215fde343b854c608dff271972c14cb1cdec8cb3186f7842d
SHA512 19581161d41e5375226763b83c4400d4a3d85a5c2ee4aab806dba491a639d0e1c667901bcd0b83caf2877aebee744631842352a99f9415d5d9e7e18317cb724d

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 396138bc74915807de0bd583ffc328d0
SHA1 85eba9dfef4956f9f341ed963fc31d217386fe8c
SHA256 2ec86a68fd039a91e30562f7e27f4c1d765564d5bf2820056be4aabc6836144b
SHA512 84016c3a805356b93da1cceefbd45574e1ce523c7560073d54955dba763918479efbae2b9e68ca2d814d47a5107d28a89e8d752ee82bf263d3e148cc539fcf09