Analysis Overview
SHA256
82bce5b89afb72677bd1f4b37119a40ecd47bf519c8fa25fa51a7c6d3edc836a
Threat Level: Known bad
The file 343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Neconyd family
Neconyd
Loads dropped DLL
Executes dropped EXE
Drops file in System32 directory
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-12 10:48
Signatures
Neconyd family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-12 10:48
Reported
2024-06-12 10:50
Platform
win10v2004-20240508-en
Max time kernel
142s
Max time network
139s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | lousta.net | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
Files
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | db5680860dbe1290bb693ce40bef0916 |
| SHA1 | ea695ceb8294f7689381e3f2bf0277a76eb848ec |
| SHA256 | 58d4883d8c48c61674cd01012d2c05a8260743873ed7832daa1df3de88b85de0 |
| SHA512 | 64f2896304dd1e44bc8e2403d9e754ebb8de40fafdedd8eaa82baf4affc570a7f2d9e63a03c6e85a02df6888542bef31bd46dba54c7e7315d686135b980f0f00 |
C:\Windows\SysWOW64\omsecor.exe
| MD5 | 4b208b923fcbc0ee22db2a4245d3d80e |
| SHA1 | f88d4293e57324a799018a5a4dcf026245d0db6d |
| SHA256 | 63b762e1e0225964717101bd291ca45ab167bcfe705d1d16c452e609cdac75c5 |
| SHA512 | 0447ade73951de7fffcff4eb5796b54ddf1e7ce38cb4da729f1245befd72da704e6e587da27c8c5eab014a13dc8616f812de49490587452614ff60844c9ae6e8 |
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | cfb1df92b3e5ec60955cad649d26fe1a |
| SHA1 | 055913825d3759b2fc58e83f53ac0cc22e1a2f2a |
| SHA256 | fd846cb797693e7c700568927c0c24706055a0f068d3c0b6f8f6a39fc6627c14 |
| SHA512 | 5aee32c38c7b055e7e300cb6b60a632dc1f438841b0cc860fdeaa5adb6f0870f2d1e9cc91f90a7c857ae949e44a3d2f47ea95174b72012071378444ca39ad6e6 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-12 10:48
Reported
2024-06-12 10:50
Platform
win7-20240220-en
Max time kernel
145s
Max time network
147s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\343c4bce0c8539550afc65184b24f2e0_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.34.198.229:80 | ow5dirasuek.com | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
Files
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | db5680860dbe1290bb693ce40bef0916 |
| SHA1 | ea695ceb8294f7689381e3f2bf0277a76eb848ec |
| SHA256 | 58d4883d8c48c61674cd01012d2c05a8260743873ed7832daa1df3de88b85de0 |
| SHA512 | 64f2896304dd1e44bc8e2403d9e754ebb8de40fafdedd8eaa82baf4affc570a7f2d9e63a03c6e85a02df6888542bef31bd46dba54c7e7315d686135b980f0f00 |
\Windows\SysWOW64\omsecor.exe
| MD5 | 60cbf581998e2b5608c93c210ad4c554 |
| SHA1 | 7eb2447bdd4a55952f7097183b64d90c352365b2 |
| SHA256 | 59da21dc0eea2d6b3198500f4d4058dc3d448e91a0072dcd0f08ac186e25efa6 |
| SHA512 | 9ba9821a13fb1b02c0439a39f6f4ff3a46a353c44f6d68fd47f1ffc1d560f7ca1cf72403b20f2e9f7d7a9764d0291b5f384080c8f03b26f37852f852edda3d76 |
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | b0bcd0b2d9f808b739de88feae1f7cf6 |
| SHA1 | 073f3da91049e21f51cf99b91d2a958b3b105c3f |
| SHA256 | e0edc732dce5302febf3428c66f50d1a0e25815a4d93c6226c0b48c5c88c0835 |
| SHA512 | 49e5133560a245bc9d5e75bccb24f3e5b5b731415206fc3b6c3f05efd4065add0ff8eea5cd16787b8d7472c47e8ae7498154542611b7cd9c73f38d0b30668226 |