Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 04:59

General

  • Target

    adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    adc6ecf023607a36859fb7f4ecee1090

  • SHA1

    47cf50273678ad4b3b74e7e3011af1cde13bc54c

  • SHA256

    dd25474b303cbfc94f88e06a5c7bab1a417e24fa84d66f0444d2d17664a45bce

  • SHA512

    9ae9ae1c81d8d160b5fc02eb61af3620eceebb38cab91a835d049ed0787a8e9ee14b2ccbae825b9209f651f3255e62f94e8b2764edd64717b5b4fea801c426e9

  • SSDEEP

    1536:Jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5:JdseIOMEZEyFjEOFqTiQm5l/5

Score
10/10

Malware Config

Extracted

Family

neconyd

C2

http://ow5dirasuek.com/

http://mkkuei4kdsz.com/

http://lousta.net/

Signatures

  • Neconyd

    Neconyd is a trojan written in C++.

  • Executes dropped EXE 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\adc6ecf023607a36859fb7f4ecee1090_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3336
    • C:\Users\Admin\AppData\Roaming\omsecor.exe
      C:\Users\Admin\AppData\Roaming\omsecor.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4268
      • C:\Windows\SysWOW64\omsecor.exe
        C:\Windows\System32\omsecor.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Users\Admin\AppData\Roaming\omsecor.exe
          C:\Users\Admin\AppData\Roaming\omsecor.exe
          4⤵
          • Executes dropped EXE
          PID:604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    68KB

    MD5

    fb78a29e582b8ac876c6ad9d4304c03c

    SHA1

    5216342a3d7a3a9f3b2e66b7ed9d533ecb684e65

    SHA256

    362e83e553a84867f409b76c83520a5a3518f8c66d66e27113b91d341830d44d

    SHA512

    bbf2c88bde3599f2cd40e26562eec1182273afa11cc6bb5c377490fe41f99e5ef03d766e46ff535f94cfd63d86c765b9fe9a3ab63f50b1ff3e64b6ba52343d1b

  • C:\Users\Admin\AppData\Roaming\omsecor.exe

    Filesize

    68KB

    MD5

    389f48591ff68c23386ec64598f551cb

    SHA1

    d63ce4071de4ebb721f766cdaeab4ac47bcd6a4c

    SHA256

    5b6c3c237334ef8c5ea14d6dab487a74a48080c8f4bf7eb6e8e93d0527d2ca5e

    SHA512

    494ba47fa82e23ff9e9f0dd8ebe81a91d29f1fc8945d8f630d806b5c29e9a0d35ee88442746d96e3a76884d8d11658fb2c8b4b8894e8491340eddbcbefe101e1

  • C:\Windows\SysWOW64\omsecor.exe

    Filesize

    68KB

    MD5

    a41db5db837b77b7996818d359e27a70

    SHA1

    91e0d4504de0d389d2d8bd89cbebde4d9c9aa062

    SHA256

    f1b0d3ecf51a2b2ca3bce1a65c8aa7e92b9880791d2cec8ce34f97b4cf31084b

    SHA512

    bf2492a0e9d0fb4af75779d2d90503e06f6efceeadc4c8ae5200fe061a7a4fecc3b33def7e077e2cba223bb32e32a149c53f627961a86e18f38507d3a9bcfac6