Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 07:24
Behavioral task
behavioral1
Sample
8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe
-
Size
89KB
-
MD5
aa54537b6cf48d963f3e516c6035f7b0
-
SHA1
86261adc32fa9c9440f576f493828ee163f448d0
-
SHA256
8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1
-
SHA512
19108f5d4db86afb6eb294a22a1523637366056efab91176d77ada95b133da9b150d287d5ff3c93e6a574fdc6c306351fb3445233daba546897a902ea45350e4
-
SSDEEP
768:jMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:jbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 3068 omsecor.exe 3004 omsecor.exe 1712 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exeomsecor.exeomsecor.exepid process 2960 8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe 2960 8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe 3068 omsecor.exe 3068 omsecor.exe 3004 omsecor.exe 3004 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 2960 wrote to memory of 3068 2960 8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe omsecor.exe PID 2960 wrote to memory of 3068 2960 8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe omsecor.exe PID 2960 wrote to memory of 3068 2960 8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe omsecor.exe PID 2960 wrote to memory of 3068 2960 8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe omsecor.exe PID 3068 wrote to memory of 3004 3068 omsecor.exe omsecor.exe PID 3068 wrote to memory of 3004 3068 omsecor.exe omsecor.exe PID 3068 wrote to memory of 3004 3068 omsecor.exe omsecor.exe PID 3068 wrote to memory of 3004 3068 omsecor.exe omsecor.exe PID 3004 wrote to memory of 1712 3004 omsecor.exe omsecor.exe PID 3004 wrote to memory of 1712 3004 omsecor.exe omsecor.exe PID 3004 wrote to memory of 1712 3004 omsecor.exe omsecor.exe PID 3004 wrote to memory of 1712 3004 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8808f6eba2eada6bc7915f98a295ae8cad1fbadfeaef7c131d75f388ddb831d1_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
89KB
MD56d4c422b7078cafe2c9f83f6badc11d4
SHA16c7560c85f5d16c98d928568f29f38eb47436707
SHA25685c273c024215309b11d295162cea4da47ba808be0eadecb605f5d1e50db273f
SHA51213a5d2ede97489d3dddcb208422832db92ef0b96524db6e211f528fd3c7409deeac618a1a564a5290632e7c648209555e09dd703134cceb40282aab3010c862a
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
89KB
MD56f78407a2ded5f4e04b059a1e4b6d4c1
SHA16d185022d85041fb81bc47a3fba0570f1da1567f
SHA25620174136d26c95e8cfb20f1ef2fc27d4163dc890a98273867870d72e48592d27
SHA512618f2fdecf477351d3c09c2c2bced3d3e0e4a9a63861640325190309810624420fd412574b99b2383395582fceb8c96ace5b9ba6c7a2799c8e78a1da58d11564
-
\Windows\SysWOW64\omsecor.exeFilesize
89KB
MD53372ba4c0cc1497b344d865a7913a170
SHA1aef9ff2be469edea881c11a8611d9a38b9db4bdf
SHA256b32bc987183615bf82f0b2ce60a8cbac6d759a8c434fba9680d6aa2a7714d23d
SHA512bb39bee8f3a56737e5ff0a94cd3a1205cef0c2fd7be4da94650e9b87c16f660edd770fe25229edf613870ea15cd11a75e23a11f1fe18232759f57dd02218dee2