Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 10:08
Behavioral task
behavioral1
Sample
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe
-
Size
35KB
-
MD5
588626f4578da9a19ed9f04361c5b350
-
SHA1
a0f04dbe854bb98cdd8ba493f69c0515d5d94b0f
-
SHA256
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d
-
SHA512
05a6436e2d93888c31ae90cc98658c6d931f74e3c462dbf19b4ea4529428d4751195d22a4d0cabc36df5668b566f6d680875c48a282feee601a448def1cd8136
-
SSDEEP
768:26vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:N8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 4704 omsecor.exe 3156 omsecor.exe 2788 omsecor.exe -
Processes:
resource yara_rule behavioral2/memory/3912-1-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/4704-6-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4704-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4704-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4704-14-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Windows\SysWOW64\omsecor.exe upx behavioral2/memory/4704-19-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3156-20-0x0000000000400000-0x000000000042D000-memory.dmp upx C:\Users\Admin\AppData\Roaming\omsecor.exe upx behavioral2/memory/3156-26-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2788-28-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2788-29-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2788-32-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 3912 wrote to memory of 4704 3912 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 3912 wrote to memory of 4704 3912 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 3912 wrote to memory of 4704 3912 906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe omsecor.exe PID 4704 wrote to memory of 3156 4704 omsecor.exe omsecor.exe PID 4704 wrote to memory of 3156 4704 omsecor.exe omsecor.exe PID 4704 wrote to memory of 3156 4704 omsecor.exe omsecor.exe PID 3156 wrote to memory of 2788 3156 omsecor.exe omsecor.exe PID 3156 wrote to memory of 2788 3156 omsecor.exe omsecor.exe PID 3156 wrote to memory of 2788 3156 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\906ba3abcc08f25d316ab851b62692d0303a14fac89042f83571b149b060b01d_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5f67f04fc093d3ca607cda966e2f32efa
SHA15c84659a194dbd8040ecfdd72aaa9ff5093b57ac
SHA2562f0947889e7c2eb35854d314acac264698a957477c8f5d8939bd5a452f216cae
SHA5127b7936919a131038684e180302b4c304fece885358fbef30afd9235e26beb41cbff2b75303384c8163dbfe06ee4ffadfcccee0796778b4c1051dfdf930588879
-
C:\Users\Admin\AppData\Roaming\omsecor.exeFilesize
35KB
MD5053b729e78affbb4bd339dc79a4de862
SHA1b04fc3bf6278e1c246d9eca096369d8f70d5a94b
SHA25629f31b0d523c5160b99363ea7f812f4402ee9f92ee3bb3879dc875eb15af10b0
SHA512f4f94e7927cd741282ce3b5b46e26f6730441f60b83d5b757e97572dc21b2ce3315ca717837dcc5fc79edc1c55b136a848de6c112e524cd94d1829bf4989494b
-
C:\Windows\SysWOW64\omsecor.exeFilesize
35KB
MD585e991dfa229d1a5a00b26e9a55f8d12
SHA1da5b7b773a04e3af90b30efee7f198b96e287013
SHA2567056851890c654ce41964c915d13a0f2e58c2622432497968db92c38856e6a22
SHA5120ad829ede33e341119d40b5bb655368e1a30f82121e4bc22bed48c0f1bed321ea2d0a6b8db486f83870c309575d3e48a67f4fde9c17a34ade064b0b4fa1c3362
-
memory/2788-28-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2788-29-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/2788-32-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3156-20-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3156-26-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3912-1-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4704-7-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4704-13-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4704-14-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4704-19-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/4704-6-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB