Analysis
-
max time kernel
86s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe
-
Size
96KB
-
MD5
17415538c00d202a5cb4e0169cf83f90
-
SHA1
a9ef8332227b94b3d2a943066127a9b7f622a105
-
SHA256
cb02fa7466189f81d6f0aa2bd844f71646022ae413ea4043dac19b065e0f4163
-
SHA512
9bef0dea2f0446cdcfbbe66fc7b79bac11ebd0bbcf21dc4ca4f65f0f51b3f2daca0829f336daf56b8d55f062525a0933db9e066462f33a621a4902fb67aa92b8
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:1Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 1100 omsecor.exe 2308 omsecor.exe 364 omsecor.exe 5060 omsecor.exe 2468 omsecor.exe 3552 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 3084 set thread context of 764 3084 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 1100 set thread context of 2308 1100 omsecor.exe omsecor.exe PID 364 set thread context of 5060 364 omsecor.exe omsecor.exe PID 2468 set thread context of 3552 2468 omsecor.exe omsecor.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2640 3084 WerFault.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 2196 1100 WerFault.exe omsecor.exe 984 2468 WerFault.exe 3116 364 WerFault.exe omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 3084 wrote to memory of 764 3084 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 3084 wrote to memory of 764 3084 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 3084 wrote to memory of 764 3084 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 3084 wrote to memory of 764 3084 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 3084 wrote to memory of 764 3084 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe PID 764 wrote to memory of 1100 764 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 764 wrote to memory of 1100 764 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 764 wrote to memory of 1100 764 17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe omsecor.exe PID 1100 wrote to memory of 2308 1100 omsecor.exe omsecor.exe PID 1100 wrote to memory of 2308 1100 omsecor.exe omsecor.exe PID 1100 wrote to memory of 2308 1100 omsecor.exe omsecor.exe PID 1100 wrote to memory of 2308 1100 omsecor.exe omsecor.exe PID 1100 wrote to memory of 2308 1100 omsecor.exe omsecor.exe PID 2308 wrote to memory of 364 2308 omsecor.exe omsecor.exe PID 2308 wrote to memory of 364 2308 omsecor.exe omsecor.exe PID 2308 wrote to memory of 364 2308 omsecor.exe omsecor.exe PID 364 wrote to memory of 5060 364 omsecor.exe omsecor.exe PID 364 wrote to memory of 5060 364 omsecor.exe omsecor.exe PID 364 wrote to memory of 5060 364 omsecor.exe omsecor.exe PID 364 wrote to memory of 5060 364 omsecor.exe omsecor.exe PID 364 wrote to memory of 5060 364 omsecor.exe omsecor.exe PID 5060 wrote to memory of 2468 5060 omsecor.exe omsecor.exe PID 5060 wrote to memory of 2468 5060 omsecor.exe omsecor.exe PID 5060 wrote to memory of 2468 5060 omsecor.exe omsecor.exe PID 2468 wrote to memory of 3552 2468 omsecor.exe omsecor.exe PID 2468 wrote to memory of 3552 2468 omsecor.exe omsecor.exe PID 2468 wrote to memory of 3552 2468 omsecor.exe omsecor.exe PID 2468 wrote to memory of 3552 2468 omsecor.exe omsecor.exe PID 2468 wrote to memory of 3552 2468 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\17415538c00d202a5cb4e0169cf83f90_NeikiAnalytics.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 2568⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 2926⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 2964⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 3002⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3084 -ip 30841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1100 -ip 11001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 364 -ip 3641⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2468 -ip 24681⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
96KB
MD5d70e45eea8cf7048f765ad3edaa6c831
SHA1498772cefe809be004e9a984ba7b604d5a1e44ce
SHA25600a7509e41b141c4cf11c9b621bfb640733af36a56e131f4141a38fc744f1859
SHA51241351f94c743da55ee3ba183527b1756a04d163a4a3508f685d4fb090f25e3e56828ac1e681b23481ecc40f647a2520c7c968a8d9d611cc13e59e65a1f772c8a
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
96KB
MD5236525cad0fd80992807c1f8b6eef799
SHA1133e1d0b2a9cc7ba21a8fa52241bf781c349fc0f
SHA256ea5142b53fa42bbdbd3ab4fb2d0228202e40aa0d53aabf7336b69e37c53322c1
SHA5121054059a0a81f2efc101e843dca6186e43980c92eb265ea503cae5c80bc004638b55dcd6aed492371d18e7566195b6390a7a19e651f2a12aaa21c1714a072280
-
C:\Windows\SysWOW64\omsecor.exeFilesize
96KB
MD5ce1f497a363496629ddbe3fcc95a784b
SHA1b406cdbc64876494ba89469fb1732c2cc9c84a39
SHA2567ce4814268c083828771204270e2527bc9f175297f39a39fefbd40090f03d29b
SHA512e5fd9c7c6c346c846692b39731d19337a91be26654339360446096640c1ee3ef1a21c4f700729b2ce6d9374f3975779ab0407b00274aec7a36766288a86a840b
-
memory/364-33-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/364-51-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/764-1-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/764-2-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/764-3-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/764-7-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1100-11-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2308-14-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2308-22-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2308-25-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2308-26-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2308-19-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2308-30-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2308-15-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2468-44-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3084-18-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3084-0-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/3552-48-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3552-49-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3552-53-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3552-56-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/5060-37-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/5060-36-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/5060-39-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB