Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 12:15
Behavioral task
behavioral1
Sample
732b2433782c09459f211457ff9a6f20_NEAS.exe
Resource
win7-20240419-en
General
-
Target
732b2433782c09459f211457ff9a6f20_NEAS.exe
-
Size
119KB
-
MD5
732b2433782c09459f211457ff9a6f20
-
SHA1
801d09fe6a3b1488740465bc9fa246947f792838
-
SHA256
d91b3ec73ca8044d0e377c7fe634d91e3d751913a801f45f4bef34570afef18b
-
SHA512
467369ddbd45434162d7f83465930a3de01a14716a82a54374182b61d43fb845edbf987b6cf85baeb9e67484e7e4c26194bb2417dcb8745595c1c30777e8077a
-
SSDEEP
1536:Dd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZznOeibgX7H:jdseIOMEZEyFjEOFqTiQmxnOeV7H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1240 omsecor.exe 2880 omsecor.exe 2564 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2036 732b2433782c09459f211457ff9a6f20_NEAS.exe 2036 732b2433782c09459f211457ff9a6f20_NEAS.exe 1240 omsecor.exe 1240 omsecor.exe 2880 omsecor.exe 2880 omsecor.exe -
resource yara_rule behavioral1/files/0x000b000000012301-10.dat upx behavioral1/memory/1240-9-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2036-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1240-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x0005000000004ed7-15.dat upx behavioral1/memory/1240-16-0x0000000000290000-0x00000000002BD000-memory.dmp upx behavioral1/memory/1240-22-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x000b000000012301-26.dat upx behavioral1/memory/2880-28-0x0000000000220000-0x000000000024D000-memory.dmp upx behavioral1/memory/2880-33-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2564-36-0x0000000000400000-0x000000000042D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1240 2036 732b2433782c09459f211457ff9a6f20_NEAS.exe 28 PID 2036 wrote to memory of 1240 2036 732b2433782c09459f211457ff9a6f20_NEAS.exe 28 PID 2036 wrote to memory of 1240 2036 732b2433782c09459f211457ff9a6f20_NEAS.exe 28 PID 2036 wrote to memory of 1240 2036 732b2433782c09459f211457ff9a6f20_NEAS.exe 28 PID 1240 wrote to memory of 2880 1240 omsecor.exe 32 PID 1240 wrote to memory of 2880 1240 omsecor.exe 32 PID 1240 wrote to memory of 2880 1240 omsecor.exe 32 PID 1240 wrote to memory of 2880 1240 omsecor.exe 32 PID 2880 wrote to memory of 2564 2880 omsecor.exe 33 PID 2880 wrote to memory of 2564 2880 omsecor.exe 33 PID 2880 wrote to memory of 2564 2880 omsecor.exe 33 PID 2880 wrote to memory of 2564 2880 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\732b2433782c09459f211457ff9a6f20_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\732b2433782c09459f211457ff9a6f20_NEAS.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:2564
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD53e5de6382dc23be53bcc614366dfade1
SHA1904dc747d63d024776d92243fb07b7bba0fb901b
SHA25611af0fc11e9b51624a2a844e9264d59ef0a26a098fc579aac0a6a282cbc5dec6
SHA512423c395e8428778cfbd57d1f0b3e19970118acefa59779ceeefa1a3070e4c87080d06854fc3f237e971f912b083d558dc5fce4baef17aa33761a3be6bcda5138
-
Filesize
119KB
MD514603b8cb35e7f4ead1ab0bd8beb216e
SHA1883071ce413f9793def0503a6fa6e32d2d2d20c7
SHA256a55c8fc3cfa53dfa699ac9be23e490f743e568f6b2bad3234609fd7b1c570967
SHA512d4b9af7266a35b67dbeb19d8a255e8d21be93a76792f5f48cc6ca5a8b91c0ecb9c183a74611213d98f05f8e8006fb48b340c7dc84d2a78fe81a85437812f3b28
-
Filesize
119KB
MD5136b7370bab9eefe01e5da2fee33bf66
SHA146ea6993adba39d9a46ad8afc662dcd1a712b705
SHA256f5f9bd9e00bd54db80780be8e9d608d9748dcb8e5901cc75f8c543c9f55e888a
SHA512d55e08e758c06322f31ce25880c236c7938dff14b02b11904ddabba99e6a852782c392eab36ded0f399a4756211e6f519c2269e0afcaee57f8d6092dda830749