Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 01:27
Behavioral task
behavioral1
Sample
76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe
-
Size
35KB
-
MD5
56dc087cd5f7b574d90fa1ec3284c880
-
SHA1
03806dac55ceeda707b0d0ca39008997373d5998
-
SHA256
76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187
-
SHA512
f3ece9aa9f350d257434a202e1ffd202c8caa26532b8e148240409e73f25df86527d729392715796df76884a3d5e1041b99930fcbbe5f71ee455c6759232ed8a
-
SSDEEP
768:J6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:k8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 216 omsecor.exe 2128 omsecor.exe 2212 omsecor.exe -
Processes:
resource yara_rule behavioral2/memory/960-0-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/216-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/960-5-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/216-8-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/216-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/216-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/216-15-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Windows\SysWOW64\omsecor.exe upx behavioral2/memory/216-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2128-22-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2128-26-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/2212-29-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2212-30-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2212-33-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 960 wrote to memory of 216 960 76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe omsecor.exe PID 960 wrote to memory of 216 960 76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe omsecor.exe PID 960 wrote to memory of 216 960 76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe omsecor.exe PID 216 wrote to memory of 2128 216 omsecor.exe omsecor.exe PID 216 wrote to memory of 2128 216 omsecor.exe omsecor.exe PID 216 wrote to memory of 2128 216 omsecor.exe omsecor.exe PID 2128 wrote to memory of 2212 2128 omsecor.exe omsecor.exe PID 2128 wrote to memory of 2212 2128 omsecor.exe omsecor.exe PID 2128 wrote to memory of 2212 2128 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\76527e09e91d10d2c86392e4f4792df0ead3d1fbff9aff938ef68ea5c6643187_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD53c9c7d55f88b0c4efb4f19816d4eab17
SHA1a2259da2f240d6bd2133964934951598a4f10c11
SHA2565831cfba6867711b203fd052a150a3e6cebe038b43ab00bae463750c1d70436a
SHA5120f09ec735b3abdf0572b87cdeb578d286be8e2d41deb49b441c1c4fd705e655ef8c521eb36f338f934daed8e8818cffadaf9616ee93b6dd73f9699500cf83301
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5a5dd43764ad353142c2f2c0494a2bff4
SHA1eb51684bc7f09e6487144283f76e2bd681983a5a
SHA2561fb35b9a815b7951d8603302cd63fcb5b862f7d1f248b3b120ce6734225ce5bf
SHA512dcf8c5f3500fb68d3609d9c7ff7739095932a36ca256a390d5ad62cac8e32ea3f01817d253f24f2b2aaae00389da389a325cf97991abce5b91cbd061813a2eb7
-
C:\Windows\SysWOW64\omsecor.exeFilesize
35KB
MD5c8c1799e878f34d5edc84b686e2430cc
SHA17fca95da67696aca4a97f290dbd3bfb7ece6bf7b
SHA256022262e68d90d8c340fa1cabc47bf2b01a6682e168bc54d908890137cd48ab1e
SHA51289060dc24a7338b7b5588348cc3aa6d95977c1d81bac75b74a472ba471d70e1e8e7d8c33c94dd90d3b605f0eb3df60ed5efdc4366dd21d4ff97a9ed939efbe43
-
memory/216-21-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/216-8-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/216-11-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/216-14-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/216-15-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/216-7-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/960-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/960-5-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2128-22-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2128-26-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2212-29-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2212-30-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2212-33-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB