Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-05-2024 01:03
Behavioral task
behavioral1
Sample
41f8d75e8978ed377acc0f3024a64a70_NEAS.exe
Resource
win7-20240221-en
General
-
Target
41f8d75e8978ed377acc0f3024a64a70_NEAS.exe
-
Size
88KB
-
MD5
41f8d75e8978ed377acc0f3024a64a70
-
SHA1
fc0a433aa5e13b050ae39b18cf5c59bfd61818d9
-
SHA256
b87a21e5ac07a9b9863ee2d9e265340bef3937e3a30a92ec74c8db618d4f50af
-
SHA512
3cfcfab11e7accebb66dea3c2f4117e5fa5879b10682f4769d411b101fae24ba2e39f1896a0ac3cdabcc25a529d3bd5f966ff11bc3e87a5e6537ed600d609c14
-
SSDEEP
768:bMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:bbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1232 omsecor.exe 2560 omsecor.exe 1176 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2400 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 2400 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 1232 omsecor.exe 1232 omsecor.exe 2560 omsecor.exe 2560 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1232 2400 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 28 PID 2400 wrote to memory of 1232 2400 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 28 PID 2400 wrote to memory of 1232 2400 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 28 PID 2400 wrote to memory of 1232 2400 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 28 PID 1232 wrote to memory of 2560 1232 omsecor.exe 32 PID 1232 wrote to memory of 2560 1232 omsecor.exe 32 PID 1232 wrote to memory of 2560 1232 omsecor.exe 32 PID 1232 wrote to memory of 2560 1232 omsecor.exe 32 PID 2560 wrote to memory of 1176 2560 omsecor.exe 33 PID 2560 wrote to memory of 1176 2560 omsecor.exe 33 PID 2560 wrote to memory of 1176 2560 omsecor.exe 33 PID 2560 wrote to memory of 1176 2560 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f8d75e8978ed377acc0f3024a64a70_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\41f8d75e8978ed377acc0f3024a64a70_NEAS.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:1176
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD53cf5d917a060684a9efff3074b149e97
SHA145fcfff1a3c4433d4f4fb4e51ae0fe25228066ec
SHA2563de32c2e9033517203ad77ef7fd349322ad359972f4a11d2eac581bab5fca96f
SHA5127cb1793a877f01a5516738412744aecc37c1acf8623d07e7d7939c5658d347be21c02a308469ff733cbdcb07f0653e085094333c35db74b0f12c852c22b503fb
-
Filesize
88KB
MD5ba4cf14dbafb2ebeaaf40af4b24a08c2
SHA1933d2b7fd8701e7fda36998a95f04025f6737e95
SHA256c838862420e04bcb5deee9a58876f2c1e62d7272a5fa02b499a49172b869c688
SHA512617e03eff253a77825c93694eb78b14cfa8f1a379ded466265438d80d82332762f84b2c58e65fbdf047918ea79d0d1b4f5ad029d23b2b6324d9fb631996fd8ae
-
Filesize
88KB
MD574da5271c5689d97e237c129bec1dddc
SHA180a57ba959bd40f6fa53f64d94fd1c6914f551bb
SHA2568958900b4df9d582986f02d7e04312bc6ff140ad23db61d6e9e1b30747f7231b
SHA5126efecd7791a52ce8e5acb98be83b5d1ed2708cad6d3d104fe703bb13146a91c1e8a82bf4b56eca8e4ee2ee412dc03cf99fbc1ae8823ba49e49ea6d78fd6e9efa