Analysis
-
max time kernel
85s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-06-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe
-
Size
96KB
-
MD5
17415538c00d202a5cb4e0169cf83f90
-
SHA1
a9ef8332227b94b3d2a943066127a9b7f622a105
-
SHA256
cb02fa7466189f81d6f0aa2bd844f71646022ae413ea4043dac19b065e0f4163
-
SHA512
9bef0dea2f0446cdcfbbe66fc7b79bac11ebd0bbcf21dc4ca4f65f0f51b3f2daca0829f336daf56b8d55f062525a0933db9e066462f33a621a4902fb67aa92b8
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:1Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 2172 omsecor.exe 2584 omsecor.exe 1908 omsecor.exe 2232 omsecor.exe 1332 omsecor.exe 2128 omsecor.exe -
Loads dropped DLL 7 IoCs
Processes:
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exepid process 1616 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 1616 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 2172 omsecor.exe 2584 omsecor.exe 2584 omsecor.exe 2232 omsecor.exe 2232 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 1984 set thread context of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 2172 set thread context of 2584 2172 omsecor.exe omsecor.exe PID 1908 set thread context of 2232 1908 omsecor.exe omsecor.exe PID 1332 set thread context of 2128 1332 omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 1984 wrote to memory of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1984 wrote to memory of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1984 wrote to memory of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1984 wrote to memory of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1984 wrote to memory of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1984 wrote to memory of 1616 1984 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1616 wrote to memory of 2172 1616 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 1616 wrote to memory of 2172 1616 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 1616 wrote to memory of 2172 1616 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 1616 wrote to memory of 2172 1616 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 2172 wrote to memory of 2584 2172 omsecor.exe omsecor.exe PID 2172 wrote to memory of 2584 2172 omsecor.exe omsecor.exe PID 2172 wrote to memory of 2584 2172 omsecor.exe omsecor.exe PID 2172 wrote to memory of 2584 2172 omsecor.exe omsecor.exe PID 2172 wrote to memory of 2584 2172 omsecor.exe omsecor.exe PID 2172 wrote to memory of 2584 2172 omsecor.exe omsecor.exe PID 2584 wrote to memory of 1908 2584 omsecor.exe omsecor.exe PID 2584 wrote to memory of 1908 2584 omsecor.exe omsecor.exe PID 2584 wrote to memory of 1908 2584 omsecor.exe omsecor.exe PID 2584 wrote to memory of 1908 2584 omsecor.exe omsecor.exe PID 1908 wrote to memory of 2232 1908 omsecor.exe omsecor.exe PID 1908 wrote to memory of 2232 1908 omsecor.exe omsecor.exe PID 1908 wrote to memory of 2232 1908 omsecor.exe omsecor.exe PID 1908 wrote to memory of 2232 1908 omsecor.exe omsecor.exe PID 1908 wrote to memory of 2232 1908 omsecor.exe omsecor.exe PID 1908 wrote to memory of 2232 1908 omsecor.exe omsecor.exe PID 2232 wrote to memory of 1332 2232 omsecor.exe omsecor.exe PID 2232 wrote to memory of 1332 2232 omsecor.exe omsecor.exe PID 2232 wrote to memory of 1332 2232 omsecor.exe omsecor.exe PID 2232 wrote to memory of 1332 2232 omsecor.exe omsecor.exe PID 1332 wrote to memory of 2128 1332 omsecor.exe omsecor.exe PID 1332 wrote to memory of 2128 1332 omsecor.exe omsecor.exe PID 1332 wrote to memory of 2128 1332 omsecor.exe omsecor.exe PID 1332 wrote to memory of 2128 1332 omsecor.exe omsecor.exe PID 1332 wrote to memory of 2128 1332 omsecor.exe omsecor.exe PID 1332 wrote to memory of 2128 1332 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
96KB
MD5236525cad0fd80992807c1f8b6eef799
SHA1133e1d0b2a9cc7ba21a8fa52241bf781c349fc0f
SHA256ea5142b53fa42bbdbd3ab4fb2d0228202e40aa0d53aabf7336b69e37c53322c1
SHA5121054059a0a81f2efc101e843dca6186e43980c92eb265ea503cae5c80bc004638b55dcd6aed492371d18e7566195b6390a7a19e651f2a12aaa21c1714a072280
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
96KB
MD5df981405c516cb91e906111788f300e7
SHA111f563dc5e8a881e86245ec02a4cb0814a7867d5
SHA256ce4e32bdaa24fb942ce23528b7f779086446269645719a243cd72bf5a9284273
SHA5128c26bbefe513922341663ad1154742580afd1d6129aa73664df9026cc9dcc5759af4394fa4483e3e54afbbab25689f72029789c438493919dfaf43744a94b85a
-
\Windows\SysWOW64\omsecor.exeFilesize
96KB
MD52b6173856b4677aaafc776d6e41ccb15
SHA1efcab6bb838dd133e8fc2a1dbdb986c6d05bd1ca
SHA256c6550cafb88467acea38cc2fccdef17647426aba4968d61f026b1af1e2cdc62b
SHA5127e9d4800c0c71f50a1d19343fda7e032c2e6ef49816df170bfdc3655b558f6a141ae4ff1e04150af015564e95d1328ac9b1c2ddd3f9d99c297db4eee14ea03e2
-
memory/1332-89-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1332-81-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1616-4-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1616-12-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1616-6-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1616-3-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1616-10-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1908-58-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1908-67-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1984-0-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1984-1-0x0000000000240000-0x0000000000263000-memory.dmpFilesize
140KB
-
memory/1984-9-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2128-94-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2128-91-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2172-34-0x00000000003D0000-0x00000000003F3000-memory.dmpFilesize
140KB
-
memory/2172-32-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2172-22-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2232-73-0x0000000000230000-0x0000000000253000-memory.dmpFilesize
140KB
-
memory/2584-45-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2584-42-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2584-39-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2584-36-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2584-56-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2584-48-0x00000000002C0000-0x00000000002E3000-memory.dmpFilesize
140KB