Malware Analysis Report

2024-11-16 12:59

Sample ID 240523-nbes2sea81
Target da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe
SHA256 7d9e8c0626a66fbc9504b9fc864cb565613f263d423180d55c97c8b410e44ee6
Tags
neconyd trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7d9e8c0626a66fbc9504b9fc864cb565613f263d423180d55c97c8b410e44ee6

Threat Level: Known bad

The file da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

neconyd trojan

Neconyd

Neconyd family

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-23 11:13

Signatures

Neconyd family

neconyd

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 11:13

Reported

2024-05-23 11:15

Platform

win7-20240221-en

Max time kernel

146s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2724 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2724 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2724 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2724 wrote to memory of 3052 N/A C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 3052 wrote to memory of 548 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3052 wrote to memory of 548 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3052 wrote to memory of 548 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 3052 wrote to memory of 548 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 548 wrote to memory of 2300 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 548 wrote to memory of 2300 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 548 wrote to memory of 2300 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 548 wrote to memory of 2300 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 5842d1ee87f8e7563bf511f5ba78904e
SHA1 6fa5edea48945a9382b9f5bcbd001d83deeeda07
SHA256 86162eabb5938da7126cc6681803195fe4fe6c9dcb684a92f264bc332e488fe2
SHA512 2baaa512739e0a3f619643229602ca37d68bece450bfb3dc48a1ff35dd468f5338b45364cc0d287f0ec95365faf5f70bc36272fabc9ac2f3b7c9db53b7e50a80

\Windows\SysWOW64\omsecor.exe

MD5 f7545c6ed1207ed8ffc9ab8ffb61d4cb
SHA1 7e9e8077f04f32dda0ff432ffd5fce5db812287f
SHA256 7e337adab3dc7e509ab8d9520b978b21731cc7980f774f7b59f98c0de7a30e40
SHA512 43e5802f9d14d1b3d41d2ce59d75c1ad7db2f6ccee4a3afcc30cbd34e9746b01d5bf884ba9cffb384994fc29b313dadf224a1eef1abba588b126ae52d03289e0

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 608da8eda26ea45121dd1328fe15f113
SHA1 730cb149499a12c7017de253d894bb87eeae3682
SHA256 c59d5874a105763f4472cec3acbf18f6c9999dfbeb5418faa593653486ac8256
SHA512 070e8bc114e76d466ef3e108dea89ce4781ad5f49554772c7da01faf5077279171427aa2fc355b7024ce0d58d82efcf2c692b26795d44e5b7bc8815100abd318

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 11:13

Reported

2024-05-23 11:15

Platform

win10v2004-20240226-en

Max time kernel

141s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
File opened for modification C:\Windows\SysWOW64\merocz.xc6 C:\Windows\SysWOW64\omsecor.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\da0360f81a8041c3e97f28eddd175d20_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3716 --field-trial-handle=3088,i,14310325015283915034,7660943942870463106,262144 --variations-seed-version /prefetch:8

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
US 13.107.253.67:443 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 73.91.225.64.in-addr.arpa udp
US 8.8.8.8:53 ow5dirasuek.com udp
US 35.91.124.102:80 ow5dirasuek.com tcp
US 8.8.8.8:53 102.124.91.35.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 27.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 5842d1ee87f8e7563bf511f5ba78904e
SHA1 6fa5edea48945a9382b9f5bcbd001d83deeeda07
SHA256 86162eabb5938da7126cc6681803195fe4fe6c9dcb684a92f264bc332e488fe2
SHA512 2baaa512739e0a3f619643229602ca37d68bece450bfb3dc48a1ff35dd468f5338b45364cc0d287f0ec95365faf5f70bc36272fabc9ac2f3b7c9db53b7e50a80

C:\Windows\SysWOW64\omsecor.exe

MD5 691869375ec5e51bb0597b356d2ccbd8
SHA1 7bd64177bd8db896bb1bc0669e2a3003f405eab2
SHA256 863a79e894ffe6896baf912d3fa136a7858d0cf0797e62e0cd690ef8899e4ef2
SHA512 7531705be4ab03e894e750effa02886a505e885c55f83ab43ebdd122fa984305ba30659335175ae48b6afbc637cbb4b9bc17483aa75288ba713a2183e90e29af