Analysis Overview
SHA256
96eb589050cf8cff49eb534bde8a7c876e125f5c8a8c44b1ca30ba8f70489314
Threat Level: Known bad
The file 13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Neconyd
Neconyd family
Executes dropped EXE
UPX packed file
Loads dropped DLL
Drops file in System32 directory
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-12 01:12
Signatures
Neconyd family
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-12 01:12
Reported
2024-06-12 01:14
Platform
win10v2004-20240508-en
Max time kernel
144s
Max time network
139s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
Files
memory/3736-0-0x0000000000400000-0x000000000042C000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 58f19535b0387ead1b90822d9ca88b4c |
| SHA1 | 006ffc4078210505eae4cffa878fbee605979c26 |
| SHA256 | d0d4589e0e06679266280fab075147fd69004f1d58fad0964f6c530a990b371b |
| SHA512 | 2f8ef9f6fc45ec4ac50432a5627418d85b55bd16253d04d9483814f448d2ad23b827745d34353d1c9b7eccfaaf6e35735b0a5991951535629fc8b921f3512890 |
memory/3736-6-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4636-7-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4636-8-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4636-10-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4636-12-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4636-13-0x0000000000400000-0x000000000042C000-memory.dmp
C:\Windows\SysWOW64\omsecor.exe
| MD5 | afd0b657995f95d5c722e69e1f5c88a9 |
| SHA1 | bd9c1735cc0cfd6f5e8a51300683abdb2ba2fd5c |
| SHA256 | f1fd325648a7429e8e54514fb36942957ad47d53cc141ff1f76b25218addebc1 |
| SHA512 | 0cbb33bd8d19c1c2b24278ff71551a86c47eabc0f0d7a6ae14eb9a538ed99b11a5fe650675aa086bed9f5f51f747716af0cd3e1b30eafd9c07dd1997d950ce12 |
memory/4636-19-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4132-21-0x0000000000400000-0x000000000042C000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | c286f53a02e7c5f34e454f27d9ef7886 |
| SHA1 | eaaa88351aa55857d2cc442d20678b6be074954b |
| SHA256 | 48fc50f968e2d566fa7b753eb12ea981d3b1f9ebfd1edc964b4fad0f8485cbdb |
| SHA512 | c636e478caf939540860868e918d74441b48b0eec8c0a842a5b28b5749067879fe06475f421b7cf205dc0d68ed21aff297c5c2d1a3753c345b7b2bc1d31e7015 |
memory/4632-25-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4632-27-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4632-29-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4632-31-0x0000000000400000-0x000000000042C000-memory.dmp
memory/4632-33-0x0000000000400000-0x000000000042C000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-12 01:12
Reported
2024-06-12 01:14
Platform
win7-20231129-en
Max time kernel
149s
Max time network
129s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\13ed5277a13f0aaf167ee1627dc2f730_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.34.198.229:80 | ow5dirasuek.com | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
Files
memory/2820-1-0x0000000000400000-0x000000000042C000-memory.dmp
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 58f19535b0387ead1b90822d9ca88b4c |
| SHA1 | 006ffc4078210505eae4cffa878fbee605979c26 |
| SHA256 | d0d4589e0e06679266280fab075147fd69004f1d58fad0964f6c530a990b371b |
| SHA512 | 2f8ef9f6fc45ec4ac50432a5627418d85b55bd16253d04d9483814f448d2ad23b827745d34353d1c9b7eccfaaf6e35735b0a5991951535629fc8b921f3512890 |
memory/2820-4-0x0000000000220000-0x000000000024C000-memory.dmp
memory/2316-12-0x0000000000400000-0x000000000042C000-memory.dmp
memory/2316-15-0x0000000000400000-0x000000000042C000-memory.dmp
memory/2316-18-0x0000000000400000-0x000000000042C000-memory.dmp
memory/2316-21-0x0000000000400000-0x000000000042C000-memory.dmp
\Windows\SysWOW64\omsecor.exe
| MD5 | b35a0c207cbea360782e929bc3570215 |
| SHA1 | c45d52bf8918f6452591236b15a230c799eea35c |
| SHA256 | 3c995465c1c23167902af7fe69885c3b222032cd35e5777f29fd163e85cce409 |
| SHA512 | 0e068452732425c19f64eda993cec8252f71c395d2c41595364fb3e2cebe6d54992ddd90321f9a83a79dda6e87b35d70bef515a6eb7773689a86560a3a106e26 |
memory/2316-24-0x0000000000280000-0x00000000002AC000-memory.dmp
memory/2316-31-0x0000000000400000-0x000000000042C000-memory.dmp
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | aa9730c39a9c56de90fe32a455a653af |
| SHA1 | deef569761b029b5493451b188e3acdd592d136f |
| SHA256 | 31c4a876c37d996c3918d79c1dd562a80ee88683523fd6b61ab50b286f970347 |
| SHA512 | ae3b74b0d0362b7e15e067059c948a855323ce56a3bcaab3375ff746492d143c433de5e8c981fc8f54be78b3b6945d71d1f2dc9bb9406556e66bf7fd45c23677 |
memory/816-42-0x0000000000400000-0x000000000042C000-memory.dmp
memory/960-44-0x0000000000400000-0x000000000042C000-memory.dmp
memory/960-46-0x0000000000400000-0x000000000042C000-memory.dmp
memory/960-49-0x0000000000400000-0x000000000042C000-memory.dmp