Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 04:59
Behavioral task
behavioral1
Sample
adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe
-
Size
68KB
-
MD5
adc6ecf023607a36859fb7f4ecee1090
-
SHA1
47cf50273678ad4b3b74e7e3011af1cde13bc54c
-
SHA256
dd25474b303cbfc94f88e06a5c7bab1a417e24fa84d66f0444d2d17664a45bce
-
SHA512
9ae9ae1c81d8d160b5fc02eb61af3620eceebb38cab91a835d049ed0787a8e9ee14b2ccbae825b9209f651f3255e62f94e8b2764edd64717b5b4fea801c426e9
-
SSDEEP
1536:Jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:JdseIOMEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4268 omsecor.exe 1448 omsecor.exe 604 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4268 3336 adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe 82 PID 3336 wrote to memory of 4268 3336 adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe 82 PID 3336 wrote to memory of 4268 3336 adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe 82 PID 4268 wrote to memory of 1448 4268 omsecor.exe 100 PID 4268 wrote to memory of 1448 4268 omsecor.exe 100 PID 4268 wrote to memory of 1448 4268 omsecor.exe 100 PID 1448 wrote to memory of 604 1448 omsecor.exe 101 PID 1448 wrote to memory of 604 1448 omsecor.exe 101 PID 1448 wrote to memory of 604 1448 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:604
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5fb78a29e582b8ac876c6ad9d4304c03c
SHA15216342a3d7a3a9f3b2e66b7ed9d533ecb684e65
SHA256362e83e553a84867f409b76c83520a5a3518f8c66d66e27113b91d341830d44d
SHA512bbf2c88bde3599f2cd40e26562eec1182273afa11cc6bb5c377490fe41f99e5ef03d766e46ff535f94cfd63d86c765b9fe9a3ab63f50b1ff3e64b6ba52343d1b
-
Filesize
68KB
MD5389f48591ff68c23386ec64598f551cb
SHA1d63ce4071de4ebb721f766cdaeab4ac47bcd6a4c
SHA2565b6c3c237334ef8c5ea14d6dab487a74a48080c8f4bf7eb6e8e93d0527d2ca5e
SHA512494ba47fa82e23ff9e9f0dd8ebe81a91d29f1fc8945d8f630d806b5c29e9a0d35ee88442746d96e3a76884d8d11658fb2c8b4b8894e8491340eddbcbefe101e1
-
Filesize
68KB
MD5a41db5db837b77b7996818d359e27a70
SHA191e0d4504de0d389d2d8bd89cbebde4d9c9aa062
SHA256f1b0d3ecf51a2b2ca3bce1a65c8aa7e92b9880791d2cec8ce34f97b4cf31084b
SHA512bf2492a0e9d0fb4af75779d2d90503e06f6efceeadc4c8ae5200fe061a7a4fecc3b33def7e077e2cba223bb32e32a149c53f627961a86e18f38507d3a9bcfac6