Analysis Overview
SHA256
77b422134569f4e713b4ff1f444e249a3a9f590d6fca9e98159f3108098bdbeb
Threat Level: Known bad
The file 28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe was found to be: Known bad.
Malicious Activity Summary
Neconyd family
Neconyd
Executes dropped EXE
Loads dropped DLL
UPX packed file
Drops file in System32 directory
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-18 07:42
Signatures
Neconyd family
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-18 07:42
Reported
2024-06-18 07:44
Platform
win7-20240611-en
Max time kernel
145s
Max time network
147s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.34.198.229:80 | ow5dirasuek.com | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
Files
memory/1936-0-0x0000000000400000-0x000000000042D000-memory.dmp
memory/1936-9-0x0000000000400000-0x000000000042D000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 120b4c516b5174e386a9cd8c8345561d |
| SHA1 | 695399896d0f2a436c9b0585f93a48e356c7ca78 |
| SHA256 | fc86958b61a4a5070c5f825a48378f2725650dcd5e7546f8652c517046790822 |
| SHA512 | ff3f8c8ddecd62e5fa0afaca7744b6daf42bf3d76eda324ac5ad7d3230e4b49773d85c0e8a933980491d91c84319e3e7a68b3ad7d33c7178e8e688a4857a6657 |
memory/2024-12-0x0000000000400000-0x000000000042D000-memory.dmp
memory/2024-13-0x0000000000400000-0x000000000042D000-memory.dmp
memory/2024-16-0x0000000000400000-0x000000000042D000-memory.dmp
memory/2024-19-0x0000000000400000-0x000000000042D000-memory.dmp
memory/2024-22-0x0000000000400000-0x000000000042D000-memory.dmp
\Windows\SysWOW64\omsecor.exe
| MD5 | 3ce3f5a0e31243d782a62f519d4dda03 |
| SHA1 | 56ab56f727214a9cc30c163de95b18199d71cf55 |
| SHA256 | 95f639d1bb20f56b27b90174926a778d699a6694a27d4cdce4067aa80e2be440 |
| SHA512 | 4c12c0273b70c1b823cf84b124c1b8b4ecc22f3f2ef75562adb64684dcbefe5e74d3821877fa1948affeb327a09323fdd78bd7462a07b7fcc74ccce4142a82f3 |
memory/2024-25-0x0000000000280000-0x00000000002AD000-memory.dmp
memory/2144-36-0x0000000000400000-0x000000000042D000-memory.dmp
memory/2024-32-0x0000000000400000-0x000000000042D000-memory.dmp
\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 1fe8d484d4311ef8aca5c1253f04b07e |
| SHA1 | 9d2d61cc509edb6b7e856ddee67b1e56b54e84f8 |
| SHA256 | 9e3619bbfe5281081aabe0b2bab6d91d377e03acf6bceacdf95d27d12b3846ce |
| SHA512 | a848c25bee6e18dc383a4710bebda8b6256443a5266ad959de5144fb03d80fc433b4037d55890cbbc0d342c97dc7e3c677370cdf41835278c8c7aa570e340c78 |
memory/1552-45-0x0000000000400000-0x000000000042D000-memory.dmp
memory/1552-47-0x0000000000400000-0x000000000042D000-memory.dmp
memory/1552-50-0x0000000000400000-0x000000000042D000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-18 07:42
Reported
2024-06-18 07:44
Platform
win10v2004-20240611-en
Max time kernel
145s
Max time network
147s
Command Line
Signatures
Neconyd
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\omsecor.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\SysWOW64\omsecor.exe | C:\Users\Admin\AppData\Roaming\omsecor.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\28573f0fd4bcb787ce26eae330f9c670_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,11069752405888604640,8928124405695604965,262144 --variations-seed-version --mojo-platform-channel-handle=4272 /prefetch:8
C:\Windows\SysWOW64\omsecor.exe
C:\Windows\System32\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
C:\Users\Admin\AppData\Roaming\omsecor.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | lousta.net | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| BE | 2.17.107.129:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 76.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 129.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | 183.59.114.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 35.15.31.184.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | mkkuei4kdsz.com | udp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
| US | 8.8.8.8:53 | 224.107.17.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.91.225.64.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ow5dirasuek.com | udp |
| US | 52.34.198.229:80 | ow5dirasuek.com | tcp |
| US | 8.8.8.8:53 | 229.198.34.52.in-addr.arpa | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| FI | 193.166.255.171:80 | lousta.net | tcp |
| US | 64.225.91.73:80 | mkkuei4kdsz.com | tcp |
Files
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 120b4c516b5174e386a9cd8c8345561d |
| SHA1 | 695399896d0f2a436c9b0585f93a48e356c7ca78 |
| SHA256 | fc86958b61a4a5070c5f825a48378f2725650dcd5e7546f8652c517046790822 |
| SHA512 | ff3f8c8ddecd62e5fa0afaca7744b6daf42bf3d76eda324ac5ad7d3230e4b49773d85c0e8a933980491d91c84319e3e7a68b3ad7d33c7178e8e688a4857a6657 |
memory/228-6-0x0000000000400000-0x000000000042D000-memory.dmp
memory/4116-5-0x0000000000400000-0x000000000042D000-memory.dmp
memory/4116-0-0x0000000000400000-0x000000000042D000-memory.dmp
memory/228-8-0x0000000000400000-0x000000000042D000-memory.dmp
memory/228-11-0x0000000000400000-0x000000000042D000-memory.dmp
memory/228-14-0x0000000000400000-0x000000000042D000-memory.dmp
memory/228-15-0x0000000000400000-0x000000000042D000-memory.dmp
C:\Windows\SysWOW64\omsecor.exe
| MD5 | ab7e45b20ae3d77d6430750979fec018 |
| SHA1 | 645ecd27db4d2e41978b2aa83492fed43bdc27b2 |
| SHA256 | f40690d338f1ddf1dd622a8473e43631bed73eeb4567e5812dbaafc4f84dc122 |
| SHA512 | e27921447c8609075c3f9f482ff1f21b5b03045fe79b2877773cb6f4a88dd1c9e8be1b055444f60b3c43af3f562b1e51ef3e8a709bcbd79d51e104913f1c319f |
memory/228-20-0x0000000000400000-0x000000000042D000-memory.dmp
memory/4764-23-0x0000000000400000-0x000000000042D000-memory.dmp
C:\Users\Admin\AppData\Roaming\omsecor.exe
| MD5 | 03fb7e5a9c05ee11624833fba5de4b7f |
| SHA1 | fb89d100a93682fce9d5c0c5c73241ffdf6b2d35 |
| SHA256 | d7d556aa93b737328152dad03e9dc55eae98e507c38c7b24ba3730a097ad4ba9 |
| SHA512 | d3155768bb74add34d1df2fdb675c80dbc1b872838a37a3d97233d417d167508a123cddce5d37227fec6ae58a0e9d8870866d6d0991e4e657ea1cc442dcf2789 |
memory/3264-27-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3264-29-0x0000000000400000-0x000000000042D000-memory.dmp
memory/3264-32-0x0000000000400000-0x000000000042D000-memory.dmp