Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/06/2024, 11:46
Behavioral task
behavioral1
Sample
54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe
-
Size
84KB
-
MD5
54bce660915caeec32b0702692de1dd0
-
SHA1
0808f6da79a2021a80cd16213341edd67ffb5e40
-
SHA256
2d258b57b0125ffb2a18af4446d8865ce8540f4f490379f4ef162fbf0fd44a9f
-
SHA512
388e81cd1ca2ce0b6bb1f75c7f2ea24695fd79bb2a8d7ab16788a4133f17543fd9be9e44aa5b454392565dd27079d9739e1c4ef65af7f3482666752210ce0720
-
SSDEEP
768:IMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:IbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3020 omsecor.exe 2928 omsecor.exe 2972 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3024 54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe 3024 54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe 3020 omsecor.exe 3020 omsecor.exe 2928 omsecor.exe 2928 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3020 3024 54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 3020 3024 54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 3020 3024 54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe 28 PID 3024 wrote to memory of 3020 3024 54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe 28 PID 3020 wrote to memory of 2928 3020 omsecor.exe 32 PID 3020 wrote to memory of 2928 3020 omsecor.exe 32 PID 3020 wrote to memory of 2928 3020 omsecor.exe 32 PID 3020 wrote to memory of 2928 3020 omsecor.exe 32 PID 2928 wrote to memory of 2972 2928 omsecor.exe 33 PID 2928 wrote to memory of 2972 2928 omsecor.exe 33 PID 2928 wrote to memory of 2972 2928 omsecor.exe 33 PID 2928 wrote to memory of 2972 2928 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54bce660915caeec32b0702692de1dd0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2972
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD568cdd576ea5b3c5728b0884d6f82f736
SHA14d24e45cd6585ef627565a348aa9b863f33b6a6f
SHA256dd4dfefce6c35b1adc5d691408ec122d23acf2625460724ed194824f64c0898a
SHA51271f82843324a321b42f9eaeaf22fe11ffc6418256c6fee060071e52f5a8ccc51522f6427a2a0cd342d31d68ee1d9f7e7ab1bf5843cc60f1e2847d7bf341c0d64
-
Filesize
84KB
MD5a0ca85cdc500ec9bba09d0dbc18c4b70
SHA1d8ceb59745274eba93dc67095a3241812ee541d7
SHA256914ba951049f67034f9c30d0956b7edcc30016d403c738db79ac0a1d3c18727c
SHA512b78ad2ba6eab6ded3d6b095feb19c18e58198d1328ca18533196a79e9a46f650e8c45263c5d3021c9a580abb5c203871db90cad5a2b4ebddeee443385b339897
-
Filesize
84KB
MD50540a2a04a3bcf1f3e114d8c8d46e82d
SHA1966caca6b4a4b4d8ebf3ed60cafb252e2f39562b
SHA256d8bcc38da567ee2b401842346b21a2d1f86f3cad85b0caa46cfb09ee5790ab14
SHA512347864178c02ff6a4919fe669f72c9e5f0afcedbf85f309dbdcea82e05be9e0fe306448f7d6a7125303a5c84727605149bfe7ba4b391b903e1b93effce2fad5f