Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe
-
Size
134KB
-
MD5
4aab679075e9e6c417bb2aa96673bb00
-
SHA1
9f563f11135e3463d46a5821b82de600e45047d3
-
SHA256
59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa
-
SHA512
26c918575d024dd2cb7f3fc8e0546ca198ff26c768349374b1001a2f9d3a2a3fe62266f8322c72d6019186f124512d3bb3687af69c98bc7b08d26bb70b68cad7
-
SSDEEP
1536:BDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:hiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 2692 omsecor.exe 3792 omsecor.exe 4384 omsecor.exe 4240 omsecor.exe 3648 omsecor.exe 768 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 4144 set thread context of 3332 4144 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe PID 2692 set thread context of 3792 2692 omsecor.exe omsecor.exe PID 4384 set thread context of 4240 4384 omsecor.exe omsecor.exe PID 3648 set thread context of 768 3648 omsecor.exe omsecor.exe -
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 872 4144 WerFault.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 5040 2692 WerFault.exe omsecor.exe 1168 4384 WerFault.exe omsecor.exe 4892 3648 WerFault.exe omsecor.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 4144 wrote to memory of 3332 4144 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe PID 4144 wrote to memory of 3332 4144 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe PID 4144 wrote to memory of 3332 4144 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe PID 4144 wrote to memory of 3332 4144 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe PID 4144 wrote to memory of 3332 4144 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe PID 3332 wrote to memory of 2692 3332 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe omsecor.exe PID 3332 wrote to memory of 2692 3332 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe omsecor.exe PID 3332 wrote to memory of 2692 3332 59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe omsecor.exe PID 2692 wrote to memory of 3792 2692 omsecor.exe omsecor.exe PID 2692 wrote to memory of 3792 2692 omsecor.exe omsecor.exe PID 2692 wrote to memory of 3792 2692 omsecor.exe omsecor.exe PID 2692 wrote to memory of 3792 2692 omsecor.exe omsecor.exe PID 2692 wrote to memory of 3792 2692 omsecor.exe omsecor.exe PID 3792 wrote to memory of 4384 3792 omsecor.exe omsecor.exe PID 3792 wrote to memory of 4384 3792 omsecor.exe omsecor.exe PID 3792 wrote to memory of 4384 3792 omsecor.exe omsecor.exe PID 4384 wrote to memory of 4240 4384 omsecor.exe omsecor.exe PID 4384 wrote to memory of 4240 4384 omsecor.exe omsecor.exe PID 4384 wrote to memory of 4240 4384 omsecor.exe omsecor.exe PID 4384 wrote to memory of 4240 4384 omsecor.exe omsecor.exe PID 4384 wrote to memory of 4240 4384 omsecor.exe omsecor.exe PID 4240 wrote to memory of 3648 4240 omsecor.exe omsecor.exe PID 4240 wrote to memory of 3648 4240 omsecor.exe omsecor.exe PID 4240 wrote to memory of 3648 4240 omsecor.exe omsecor.exe PID 3648 wrote to memory of 768 3648 omsecor.exe omsecor.exe PID 3648 wrote to memory of 768 3648 omsecor.exe omsecor.exe PID 3648 wrote to memory of 768 3648 omsecor.exe omsecor.exe PID 3648 wrote to memory of 768 3648 omsecor.exe omsecor.exe PID 3648 wrote to memory of 768 3648 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\59883ed7189f0a39bfa0d6b4948d13dae2caac9a71d335684d3cffd63716fefa_NeikiAnalytics.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 2448⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 2926⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 3004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 2882⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4144 -ip 41441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2692 -ip 26921⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1276,i,7977653611488681184,6839495125838449898,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:81⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4384 -ip 43841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3648 -ip 36481⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
134KB
MD5e71f813f07d873165797b9ecd1d3735c
SHA138a73d59781f5c612630ee73123cb7207800327c
SHA2564d9dad76f470632fc230a8ee330bce6f1eaa909dcf1223187f876b97c85af274
SHA51208b3d881a41c3ddfdf0b3436ad15b6e649d13847fc2cc3178fbb35f553be51866f7cfbb00a5d6fb21a089a997bd13eac2842903941c999fa011c324c6cbf180f
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
134KB
MD5707df6f92718536432a37725677c88cd
SHA178df910aeb42503852dc41ba68ad99f84ba4a431
SHA25673a0e1e49820c37a6aea064e63da9a193c09b86e33dd1595c93f9875e6dab9d0
SHA512abcf69aaaa74004e374f75c0c7e8859ebfbbf806ca298a482ae9ab7e67a837c35fca257b5b1c7bbcd40b6b13972e313f20b097654a5b0681b75f0c31097645d2
-
C:\Windows\SysWOW64\omsecor.exeFilesize
134KB
MD5b3975aa330e755ba0472a1edb76e890b
SHA1ec3f5e7feca823e64eec40c349c50ab102fd17d1
SHA256bc25d18431311737e77c66741b83ca6638a1dee0a78f079faf345e083dfc2c54
SHA512c0ffd36ef9d89c87088d95b1f2d1049422b147e5cb4d84d3a4d549d227d2d42f8391b360522eb319c257b3e4cdacc1568eeed32ff4c0c23926ec2d443085218a
-
memory/768-49-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/768-47-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/768-54-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/768-51-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2692-15-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/2692-9-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3332-3-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3332-6-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3332-2-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3332-1-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3648-50-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3648-42-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/3792-23-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3792-31-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3792-24-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3792-17-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3792-13-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3792-14-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4144-0-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4144-16-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB
-
memory/4240-35-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4240-38-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4240-36-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4384-32-0x0000000000400000-0x0000000000424000-memory.dmpFilesize
144KB