Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-06-2024 10:08
Behavioral task
behavioral1
Sample
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe
-
Size
35KB
-
MD5
588626f4578da9a19ed9f04361c5b350
-
SHA1
a0f04dbe854bb98cdd8ba493f69c0515d5d94b0f
-
SHA256
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d
-
SHA512
05a6436e2d93888c31ae90cc98658c6d931f74e3c462dbf19b4ea4529428d4751195d22a4d0cabc36df5668b566f6d680875c48a282feee601a448def1cd8136
-
SSDEEP
768:26vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:N8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 2184 omsecor.exe 1636 omsecor.exe 2516 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exeomsecor.exeomsecor.exepid process 3056 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe 3056 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe 2184 omsecor.exe 2184 omsecor.exe 1636 omsecor.exe 1636 omsecor.exe -
Processes:
resource yara_rule behavioral1/memory/3056-0-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral1/memory/2184-12-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/3056-9-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2184-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2184-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2184-17-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2184-20-0x0000000000400000-0x000000000042D000-memory.dmp upx \Windows\SysWOW64\omsecor.exe upx behavioral1/memory/2184-24-0x00000000003B0000-0x00000000003DD000-memory.dmp upx behavioral1/memory/1636-35-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2184-31-0x0000000000400000-0x000000000042D000-memory.dmp upx \Users\Admin\AppData\Roaming\omsecor.exe upx behavioral1/memory/2516-44-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2516-46-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2516-48-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2516-50-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 3056 wrote to memory of 2184 3056 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 3056 wrote to memory of 2184 3056 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 3056 wrote to memory of 2184 3056 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 3056 wrote to memory of 2184 3056 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 2184 wrote to memory of 1636 2184 omsecor.exe omsecor.exe PID 2184 wrote to memory of 1636 2184 omsecor.exe omsecor.exe PID 2184 wrote to memory of 1636 2184 omsecor.exe omsecor.exe PID 2184 wrote to memory of 1636 2184 omsecor.exe omsecor.exe PID 1636 wrote to memory of 2516 1636 omsecor.exe omsecor.exe PID 1636 wrote to memory of 2516 1636 omsecor.exe omsecor.exe PID 1636 wrote to memory of 2516 1636 omsecor.exe omsecor.exe PID 1636 wrote to memory of 2516 1636 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5053b729e78affbb4bd339dc79a4de862
SHA1b04fc3bf6278e1c246d9eca096369d8f70d5a94b
SHA25629f31b0d523c5160b99363ea7f812f4402ee9f92ee3bb3879dc875eb15af10b0
SHA512f4f94e7927cd741282ce3b5b46e26f6730441f60b83d5b757e97572dc21b2ce3315ca717837dcc5fc79edc1c55b136a848de6c112e524cd94d1829bf4989494b
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD57745fdaf0e88f7073c52f540885ee9f1
SHA1fe6ee5c3a9bbb17a5e8bc067fa5fafdcb73b82c7
SHA256991ab0cc199dda19b78eba787d3dd8f9462bde9b9fa9da50d909e4c6085942d1
SHA5125948e19e7d43d4dbcf3ada424fbfcece54982800321f3a04b1303465d43eca01c3bb06b6859fad111d2984f18d02306271784d78a133dc006e214fcf9292eff9
-
\Windows\SysWOW64\omsecor.exeFilesize
35KB
MD584aeaf23c0d084873616e6946fa0c469
SHA1e7b629d022502f8a2eaca32f03c570fc412f319e
SHA256763ae70e2b5009bc34580f2cc36c21baa23c47ebccdcdf842f84d723bc159c6f
SHA512e7ebb7fb6cf0ae2405d1ee7f1310fbcd755142268b6297dc6cc924b8fbcbd99c0caa3e56a86bf4c39d14fb852dad2b7590ce2c0a17e4a66471aec73b2f9e448e
-
memory/1636-35-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2184-24-0x00000000003B0000-0x00000000003DD000-memory.dmpFilesize
180KB
-
memory/2184-15-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2184-17-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2184-20-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2184-13-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2184-31-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2184-12-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2516-44-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2516-46-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2516-48-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2516-50-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3056-0-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3056-9-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB