Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-06-2024 06:26
Behavioral task
behavioral1
Sample
46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe
-
Size
61KB
-
MD5
bc67fe3586ce4c8b90630d3bc03607e0
-
SHA1
2f94e4083afcab6fe35d1b1d7ed8c5ae66a7e5fb
-
SHA256
46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7
-
SHA512
38bf54fd0907f3c101d1d158d7fc6e4ad18a5eecc0771e6a453934cb7c0cd3cc0aaf85e859f9a3d72d632a9b3be8edd0ec8cc597032705ccf271294b736bf516
-
SSDEEP
768:6MEIvFGvZEr8LFK0ic46N47eSdYAHwmZ7Bp6JXXlaa5uA:6bIvYvZEyFKF6N4yS+AQmZIl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid process 280 omsecor.exe 2884 omsecor.exe 2388 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exeomsecor.exeomsecor.exepid process 2964 46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe 2964 46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe 280 omsecor.exe 280 omsecor.exe 2884 omsecor.exe 2884 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exeomsecor.exeomsecor.exedescription pid process target process PID 2964 wrote to memory of 280 2964 46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe omsecor.exe PID 2964 wrote to memory of 280 2964 46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe omsecor.exe PID 2964 wrote to memory of 280 2964 46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe omsecor.exe PID 2964 wrote to memory of 280 2964 46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe omsecor.exe PID 280 wrote to memory of 2884 280 omsecor.exe omsecor.exe PID 280 wrote to memory of 2884 280 omsecor.exe omsecor.exe PID 280 wrote to memory of 2884 280 omsecor.exe omsecor.exe PID 280 wrote to memory of 2884 280 omsecor.exe omsecor.exe PID 2884 wrote to memory of 2388 2884 omsecor.exe omsecor.exe PID 2884 wrote to memory of 2388 2884 omsecor.exe omsecor.exe PID 2884 wrote to memory of 2388 2884 omsecor.exe omsecor.exe PID 2884 wrote to memory of 2388 2884 omsecor.exe omsecor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46cd62a07513f34a9eae609f2b1c3af92f58306b5d8e65512d1bdf45bd8c98c7_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
61KB
MD588f5bcd0a95d2b9abcb834cd1126afe5
SHA13779fce0e9c9742682c1318ae1c6d3ce52dd4fb9
SHA256fc9b055373959f3c4f21bc04956b085da1b2e14748ba0fc1261b5b4462738d5a
SHA512361486618c3bcbd672cdc1c111d9d20b181bcaf6f6e9d46f321f5f9d82a0cbf31f7f4341698e95652f427219106b24d6f8fb43a11756dec9793b226b7114aa37
-
\Users\Admin\AppData\Roaming\omsecor.exeFilesize
61KB
MD5adb0f97ab033548161804886fe43e028
SHA1ced84eada68e025879b1b534cdfcabd715b13c68
SHA25657e7708172edee82afe4c33b5fccae52eb05d5691722c7cbd98cebe5565bf569
SHA51233a44f8f3d2f1f58b86a96ab07b2f69a307a950e8aabe5d00967171d72248ac49d4011ef9edc9aace8fd24ce7c8e14c6167d3fab43840690fc1d4aae1faba3db
-
\Windows\SysWOW64\omsecor.exeFilesize
61KB
MD548ee3f07550be1baaf3ecf20a5586e75
SHA19f78bc54d772519952d9987392bb76c15d516be3
SHA256739de06f23c7890ccb8c0e3d330f57bef3a0186fa1e513a9beaeb84651009362
SHA512c6a59e6779967cea0bc40b22d212a570a357d717e2b3b7e3be3bebd293d1a2dae3e65adf75fa5fa14037e2fe2def08bbb1385c7c518d695149406f5a18e0e4a9