Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-06-2024 00:22
Behavioral task
behavioral1
Sample
7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe
-
Size
76KB
-
MD5
7b16ab832b6f4b1444c0169b0a780140
-
SHA1
b3fdbf7b83e25de3a6718cd05921043e1b734456
-
SHA256
eb463c48a9efdee15ea202dc72ee678db9fb50b607e062cbec3fcdaf92bcf9ad
-
SHA512
75540a182a4193ccaa4b8b77c5a41504f4bcb37e01a8458ba07bd90e0c520b66219e04fbc21b13d8f7fd6de9cd82ff4ed76644cc43f39e0f54acf1582c5e6f98
-
SSDEEP
768:jMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAW:jbIvYvZEyFKF6N4yS+AQmZTl/5O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 2380 omsecor.exe 1884 omsecor.exe 1656 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exeomsecor.exeomsecor.exepid process 2932 7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe 2932 7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe 2380 omsecor.exe 2380 omsecor.exe 1884 omsecor.exe 1884 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 2932 wrote to memory of 2380 2932 7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe omsecor.exe PID 2932 wrote to memory of 2380 2932 7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe omsecor.exe PID 2932 wrote to memory of 2380 2932 7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe omsecor.exe PID 2932 wrote to memory of 2380 2932 7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe omsecor.exe PID 2380 wrote to memory of 1884 2380 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1884 2380 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1884 2380 omsecor.exe omsecor.exe PID 2380 wrote to memory of 1884 2380 omsecor.exe omsecor.exe PID 1884 wrote to memory of 1656 1884 omsecor.exe omsecor.exe PID 1884 wrote to memory of 1656 1884 omsecor.exe omsecor.exe PID 1884 wrote to memory of 1656 1884 omsecor.exe omsecor.exe PID 1884 wrote to memory of 1656 1884 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7b16ab832b6f4b1444c0169b0a780140_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
76KB
MD53e770b1db210399422e5ca9da1c3b1f2
SHA1636a75fb354b721f76188f0861572f06994f41e3
SHA2566508fa2150785142ff98ba4d9bfe7dad1c32cbfafca48e8e9a57cede75d35013
SHA51284ff39bdf081010b72cc583e0bc3052f97101e1448ef52931cc2f6dffb9dabf5659932365b8b96683c9ff5b74c44b21117962f85a039cd7f87a926bfdf204abb
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
76KB
MD564d8940ae3428d339993a804bff01098
SHA17e7d78650cdea6c145a29c297561a5cf6f56bbb8
SHA256722d11ae6fab9db23f4d8e6c74fbe58d1a7217d9b994f2ab246f63f0876a8345
SHA512a92d23a7810a35d226c55a589d03417c37d10ccb0ab2fc801273f9f3f16aca2526d566e6a5390de68184e928ec6d8e469f8c7ad7c87ca469b5d6b7e80c10ff6a
-
\Windows\SysWOW64\omsecor.exeFilesize
76KB
MD5297ab02206939839185c4af842c55fc0
SHA12b556b0b33eb7c61a0d4a648442a7be7e0213138
SHA2564cb30525723e6f5bdad1c0893323bf3cd47d204372dc1f0aa785ea9a5bbc65cc
SHA512ff7d9cc99565a73f55291751d314a7faa77b19cb457d4a237e3f9c8d23b7ff0105fa2f017b40383116bcf240a54ccbee3a71a33e118e6e8f3237a123e76e5146