Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
20-06-2024 06:23
Behavioral task
behavioral1
Sample
3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe
-
Size
89KB
-
MD5
5c0519629d68730c9f5f70d3a1c601f0
-
SHA1
9fcf52a1fd7aa359872d21eaa76dac0ad09e6b76
-
SHA256
3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5
-
SHA512
34c1e5b1de7a7a04bca024083ec8106d82b25f7ce3dddad568decdb7bb6ce9a35b2d7f922f6499c4b30ada948fdb90c0be82d2ada9133b768683961a6285c255
-
SSDEEP
768:pMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:pbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 2300 omsecor.exe 2876 omsecor.exe 772 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exeomsecor.exeomsecor.exepid process 1340 3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe 1340 3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe 2300 omsecor.exe 2300 omsecor.exe 2876 omsecor.exe 2876 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 1340 wrote to memory of 2300 1340 3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe omsecor.exe PID 1340 wrote to memory of 2300 1340 3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe omsecor.exe PID 1340 wrote to memory of 2300 1340 3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe omsecor.exe PID 1340 wrote to memory of 2300 1340 3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe omsecor.exe PID 2300 wrote to memory of 2876 2300 omsecor.exe omsecor.exe PID 2300 wrote to memory of 2876 2300 omsecor.exe omsecor.exe PID 2300 wrote to memory of 2876 2300 omsecor.exe omsecor.exe PID 2300 wrote to memory of 2876 2300 omsecor.exe omsecor.exe PID 2876 wrote to memory of 772 2876 omsecor.exe omsecor.exe PID 2876 wrote to memory of 772 2876 omsecor.exe omsecor.exe PID 2876 wrote to memory of 772 2876 omsecor.exe omsecor.exe PID 2876 wrote to memory of 772 2876 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3e9b205e59fe5b80997bd8dc9c289527a6b5ee10546eeba9935c1cd8a58a07e5_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
89KB
MD5e52986ee168e1d7047383e93337b5c79
SHA1c21e48fdc44c75eff8d7c8d0692a96678228892b
SHA2561f480270ef537195ab187e18f62c00321bbf8b7abd987dab0d35d2224d2a70f1
SHA512a338c29fb22b64029d1123e5f3f1432da31d3753a3613cb8402e9b3cd1acf3da97a4db7e6912b9e89732229d29a532685435f33c7db3fda24a60480ad9013bf0
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
89KB
MD5b484fd7822cf6aa520061925b84a5e7f
SHA17c8b3673f1398185bcf7b0f67aff03b9bc094511
SHA2567929dd345717ddfa6867d86faee0af3c94656ddbd84e402c5690d0846be47a45
SHA512e6fcf0713861651808893a72393e77fbc2b25241eb251670568cf5cb0178de1e643011d24d09d296cb16a1e395bc45dadfecb7137a58b5286344bd48dd081e2e
-
\Windows\SysWOW64\omsecor.exeFilesize
89KB
MD506936b6cc51cd388b449eb4e5a9fdfe9
SHA16a69cc2d601795c86186c4eb51c69600c63cc7ea
SHA2564f06b787b2725ad96cbd4d800fa83b079c07340d9eb31345f36d6766311c8564
SHA512098a780cbcf1419492ac0d8a821c287db03ef4cf2b1c7b658c48d4b72c8421deadbc09313f4f152e37846b29633a5bd556e212f806ffbf04e68de08a02ceecd1