Malware Analysis Report

2024-11-16 13:01

Sample ID 240523-zfsfgsfe5y
Target 7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe
SHA256 1a3418fc1339eee339bb1b55e612e3682ce3cfcd78bcca9740772207883d43b2
Tags
neconyd trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1a3418fc1339eee339bb1b55e612e3682ce3cfcd78bcca9740772207883d43b2

Threat Level: Known bad

The file 7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

neconyd trojan

Neconyd family

Neconyd

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-23 20:39

Signatures

Neconyd family

neconyd

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 20:39

Reported

2024-05-23 20:42

Platform

win7-20240221-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1728 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 1728 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 1728 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 1728 wrote to memory of 2032 N/A C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2032 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2032 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2032 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2032 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Roaming\omsecor.exe C:\Windows\SysWOW64\omsecor.exe
PID 2860 wrote to memory of 1976 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2860 wrote to memory of 1976 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2860 wrote to memory of 1976 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe
PID 2860 wrote to memory of 1976 N/A C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe

Processes

C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 ow5dirasuek.com udp
US 52.34.198.229:80 ow5dirasuek.com tcp
FI 193.166.255.171:80 lousta.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 80017cc0320965e0660ff692dfe41245
SHA1 2064dc46eef83ec686ea57a4b4f7bd2fbb39d945
SHA256 7a9aa5d12b693b4c67e89f7e38762581a63be7c50087e6a6b8e6ebe441ff4211
SHA512 6a90f3261724c1297fabee0f478cd94a57ffd2a7763e6e841ab4eb42d6572edb6b7efde8da8d40c1df9951a437f9208c016c8ea284084638aec9ba6b455bd869

\Windows\SysWOW64\omsecor.exe

MD5 5ab5d9a3760523dd12bd6c6cdf87acce
SHA1 f44de2b0b3565ff96de4a94db9c794c9d279838f
SHA256 94459bd2d9a341d3fc3f37554b66152ff3b06f84570a5ed7dcb1684983ef371b
SHA512 b886b3af72730c195518a837354af6e38acff6fccd35ede52b7cc5b307938bb4fdee077e6dbca075fc825a7448bc5644ddae898d3eac60b3c2d5285332d38e03

\Users\Admin\AppData\Roaming\omsecor.exe

MD5 c85e43e497fe26172c1a60b1fbfb313c
SHA1 477c15e6c157ee2df190f4b049f7a3dee4657f1c
SHA256 93c292c3b98e6badb1fb5140206244730de03ad8b5cfa454f0255097a36072be
SHA512 9f0a799479aa616d2b41f3f2a298ff288188855069574b36018ae70fff6aa2e5e3f8bd7354327c3afb81a0e86580950fa19442515fb1e1347dc069dffb5a6c90

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 20:39

Reported

2024-05-23 20:42

Platform

win10v2004-20240426-en

Max time kernel

145s

Max time network

147s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe"

Signatures

Neconyd

trojan neconyd

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
N/A N/A C:\Windows\SysWOW64\omsecor.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\omsecor.exe C:\Users\Admin\AppData\Roaming\omsecor.exe N/A
File opened for modification C:\Windows\SysWOW64\merocz.xc6 C:\Windows\SysWOW64\omsecor.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\7e912409ad2b9e57be9f5dccb7460a80_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Users\Admin\AppData\Roaming\omsecor.exe

C:\Windows\SysWOW64\omsecor.exe

C:\Windows\System32\omsecor.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 lousta.net udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
NL 23.62.61.152:443 www.bing.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 88.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 22.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 152.61.62.23.in-addr.arpa udp
NL 23.62.61.152:443 www.bing.com tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 mkkuei4kdsz.com udp
US 64.225.91.73:80 mkkuei4kdsz.com tcp
US 8.8.8.8:53 73.91.225.64.in-addr.arpa udp
US 8.8.8.8:53 ow5dirasuek.com udp
US 52.34.198.229:80 ow5dirasuek.com tcp
US 8.8.8.8:53 229.198.34.52.in-addr.arpa udp
FI 193.166.255.171:80 lousta.net tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
FI 193.166.255.171:80 lousta.net tcp
US 64.225.91.73:80 mkkuei4kdsz.com tcp

Files

C:\Users\Admin\AppData\Roaming\omsecor.exe

MD5 80017cc0320965e0660ff692dfe41245
SHA1 2064dc46eef83ec686ea57a4b4f7bd2fbb39d945
SHA256 7a9aa5d12b693b4c67e89f7e38762581a63be7c50087e6a6b8e6ebe441ff4211
SHA512 6a90f3261724c1297fabee0f478cd94a57ffd2a7763e6e841ab4eb42d6572edb6b7efde8da8d40c1df9951a437f9208c016c8ea284084638aec9ba6b455bd869

C:\Windows\SysWOW64\omsecor.exe

MD5 196fa81478c606b00b383ea6daca995c
SHA1 dd537feecee6fa49189c7e3309bc75e69f453c0c
SHA256 b7f567efae1560fab500e29d538051a95f130c63ac721e5d69acbe715312368c
SHA512 a085d5eb94c6d97be29b2973ce0c27d8b5579784c7ec65275f92f24633fd0246f280adbc5f3cbf62c3cd17042b00093331a422ae2ef520c48b465bc1c95f0fe7