Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe
-
Size
96KB
-
MD5
d5c619cf84bd3be0470d3672568f1430
-
SHA1
2e58de2fadfe56549262efd14ba858b0c56b73a6
-
SHA256
2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613
-
SHA512
74acaabd9d95ce1029d6a260413d9e7eb38e8bddefa2602ba370b92b54838437b896f42fcef74a0df5b771c8c15c1f01d7013abbb74525caca9d2d5c4f91d7b2
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:nGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid process 2432 omsecor.exe 2864 omsecor.exe 1860 omsecor.exe 2764 omsecor.exe 2880 omsecor.exe 2240 omsecor.exe -
Loads dropped DLL 7 IoCs
Processes:
2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exepid process 2232 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2232 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2432 omsecor.exe 2864 omsecor.exe 2864 omsecor.exe 2764 omsecor.exe 2764 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 352 set thread context of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 2432 set thread context of 2864 2432 omsecor.exe omsecor.exe PID 1860 set thread context of 2764 1860 omsecor.exe omsecor.exe PID 2880 set thread context of 2240 2880 omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid process target process PID 352 wrote to memory of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 352 wrote to memory of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 352 wrote to memory of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 352 wrote to memory of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 352 wrote to memory of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 352 wrote to memory of 2232 352 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe PID 2232 wrote to memory of 2432 2232 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe omsecor.exe PID 2232 wrote to memory of 2432 2232 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe omsecor.exe PID 2232 wrote to memory of 2432 2232 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe omsecor.exe PID 2232 wrote to memory of 2432 2232 2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe omsecor.exe PID 2432 wrote to memory of 2864 2432 omsecor.exe omsecor.exe PID 2432 wrote to memory of 2864 2432 omsecor.exe omsecor.exe PID 2432 wrote to memory of 2864 2432 omsecor.exe omsecor.exe PID 2432 wrote to memory of 2864 2432 omsecor.exe omsecor.exe PID 2432 wrote to memory of 2864 2432 omsecor.exe omsecor.exe PID 2432 wrote to memory of 2864 2432 omsecor.exe omsecor.exe PID 2864 wrote to memory of 1860 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 1860 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 1860 2864 omsecor.exe omsecor.exe PID 2864 wrote to memory of 1860 2864 omsecor.exe omsecor.exe PID 1860 wrote to memory of 2764 1860 omsecor.exe omsecor.exe PID 1860 wrote to memory of 2764 1860 omsecor.exe omsecor.exe PID 1860 wrote to memory of 2764 1860 omsecor.exe omsecor.exe PID 1860 wrote to memory of 2764 1860 omsecor.exe omsecor.exe PID 1860 wrote to memory of 2764 1860 omsecor.exe omsecor.exe PID 1860 wrote to memory of 2764 1860 omsecor.exe omsecor.exe PID 2764 wrote to memory of 2880 2764 omsecor.exe omsecor.exe PID 2764 wrote to memory of 2880 2764 omsecor.exe omsecor.exe PID 2764 wrote to memory of 2880 2764 omsecor.exe omsecor.exe PID 2764 wrote to memory of 2880 2764 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2240 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2240 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2240 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2240 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2240 2880 omsecor.exe omsecor.exe PID 2880 wrote to memory of 2240 2880 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\2ef8b61c2adbb09af5ac70a742b646f6bbe57e7bdd070f3e1fe503bd5a539613_NeikiAnalytics.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
96KB
MD5ee22b2728166bc4beb3471706d7ee9e7
SHA12039c210b1d4538cbd56a0a116aff0c5034e5701
SHA256c6e25fe50ba56e7cdfe5fdaad0b8fb158e9132ec14ef28aaecc57baf6859a621
SHA5129f266ba04f310e364b4c009c831621e79790ab14a16a22ee88c302cb7ba8f051d7ab8809a2d6bbc90cb354199b936a8a4182e4a4b9057e1fe0bdd70bb354be56
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
96KB
MD563daa3f21793094b98f96c65d3719d5c
SHA176d443af2b4e5340cdb77b62d7f078fa61ce5a9c
SHA2561a02250d3164965269290eb205b848f44ee80abeaed5f0fbedd26ad6b139f1d8
SHA5121523297aeeb705d934ecfcdadabf3131591a40ee00061c7caef4d1a7f4efd3731536224d76a9bbb3f8ebd9698aa14e060570a40251bdda58e9a958f8c6c35643
-
\Windows\SysWOW64\omsecor.exeFilesize
96KB
MD5360768c7e9f38afe4f7996b1c5eef065
SHA172f9c83bac37749da927ff97f99e86268ac31fe7
SHA2560151b139c9afe2209ff2d1126c6d6c2037a9d749d58b8cc7c696d1a8e0a31c74
SHA512a01577305137e7095a78b1565efb11c05d00b0433497c9025e9241095832501b132c0d2c47d102240d19e23759936ee8e9ab9dfaa73169f4a20d3c1562b82964
-
memory/352-7-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/352-0-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1860-64-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/1860-56-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2232-5-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2232-9-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2232-1-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2232-11-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2232-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2240-88-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2240-91-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2432-31-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2432-21-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2764-71-0x0000000000230000-0x0000000000253000-memory.dmpFilesize
140KB
-
memory/2864-34-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2864-43-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2864-40-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2864-37-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2864-54-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2864-46-0x0000000000330000-0x0000000000353000-memory.dmpFilesize
140KB
-
memory/2880-79-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB
-
memory/2880-85-0x0000000000400000-0x0000000000423000-memory.dmpFilesize
140KB