Malware Analysis Report

2024-11-16 13:01

Sample ID 240523-gfpeqafe51
Target a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe
SHA256 ce0c28c5b167df1edd58760f5eeeb3b3ed9ab51348b1208f1d84c8817792f314
Tags
neconyd trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ce0c28c5b167df1edd58760f5eeeb3b3ed9ab51348b1208f1d84c8817792f314

Threat Level: Known bad

The file a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

neconyd trojan

Neconyd family

Neconyd

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-23 05:45

Signatures

Neconyd family

neconyd

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 05:45

Reported

2024-05-23 05:47

Platform

win7-20240221-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2180 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2180 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2180 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2180 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2004 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2004 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2004 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2004 wrote to memory of 2800 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2800 wrote to memory of 2360 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2800 wrote to memory of 2360 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2800 wrote to memory of 2360 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2800 wrote to memory of 2360 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 243346a7febfca3ec2d7b77ba733ce1c
SHA1 54968c1b9f09a2d4cddefb0c82694e87b74deacb
SHA256 08f78575e0afc4abc19fd17b8fe028c1c85e43e3da1896e94b27496510c3aecb
SHA512 babe5a1e7952e2911e8610838d121b6da709d3baac23cf954385fcf0fad6bb1aeac15abe5c9c98310a2f89112aa78c3f380e6038a787c3623c2e61106e3bda3f

\Windows\SysWOW64\omsecor.exe

MD5 f5422c7a6b423926970ad3deeea6935a
SHA1 ae7e9726ad3b71257c63366089d7ff7ed5bdba18
SHA256 06049b571f96bfdc00ad6a6f3334ac846c4d98c269ecc315b2f91b2e84a16954
SHA512 e107058e273a9a01e4af8284a793debd7ba48f832cdf232cc8bd6829a6c1cca629341cb3b547239d1388dc9ffbfaedfbe697e9da0426ed8c795182ab760ca382

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 47904f6ff3f71dda98dd63b3b0862fee
SHA1 3c679dfdc24c4487a3421017ebc235bb8bf520bc
SHA256 05e946dbe513d3ae17c430f539fb8fb01712f7d3e1aa721c492157f2d192fc95
SHA512 c01ebea2fb8e1465355e02d11bcbb2aeded664c07ec2a43ee7cf8016503fe8e7615f86a86be07cc9f40a692dae18433c2d8f51885144addb7423c91ff72ed0cb

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 05:45

Reported

2024-05-23 05:47

Platform

win10v2004-20240508-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
File opened for modification C:\Windows\SysWOW64\merocz.xc6 C:\Windows\SysWOW64\omsecor.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\a58daec1e422f2fdc729305b9b9d69f0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 71.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 57.169.31.20.in-addr.arpa udp
BE 2.17.196.129:443 www.bing.com tcp
US 8.8.8.8:53 129.196.17.2.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 73.91.225.64.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
US 8.8.8.8:53 102.124.91.35.in-addr.arpa udp
US 52.111.227.11:443 tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 243346a7febfca3ec2d7b77ba733ce1c
SHA1 54968c1b9f09a2d4cddefb0c82694e87b74deacb
SHA256 08f78575e0afc4abc19fd17b8fe028c1c85e43e3da1896e94b27496510c3aecb
SHA512 babe5a1e7952e2911e8610838d121b6da709d3baac23cf954385fcf0fad6bb1aeac15abe5c9c98310a2f89112aa78c3f380e6038a787c3623c2e61106e3bda3f

C:\Windows\SysWOW64\omsecor.exe

MD5 38eae0df348e695208d01e55b359173d
SHA1 70c3445bd11050bdd6ff3972e46e371c3b60ea58
SHA256 68349950a70f4ef01164fb4808cafcc9dfc63f942580ed71e429a3924caddf79
SHA512 b2a55e364e30f409356551dd1ba0b91a2381a6721a0a418c1ea77935cf486fdf804c57c53d364ab59488d0a712af22a88cbb3b6763ae36f2fbc8c5302084a627