Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 09:09
Behavioral task
behavioral1
Sample
db7fd9d0c2d889846bada4b4a8834fc0N.exe
Resource
win7-20240704-en
5 signatures
120 seconds
General
-
Target
db7fd9d0c2d889846bada4b4a8834fc0N.exe
-
Size
316KB
-
MD5
db7fd9d0c2d889846bada4b4a8834fc0
-
SHA1
3222c11400124cbdf4ba2fc60e94329e36ee0651
-
SHA256
9f50f624547e4e800737e131524259ee09c6454e1821de6c34aadf1d58029cd6
-
SHA512
a321808f42086abc4c31f761cf7b7417a99dfe25b450cb3aa7197dd44598a885fc414825e954d89cd46f6968d472224f0344941db169f9abb00a6523fa48e148
-
SSDEEP
1536:n4d9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZUnOHBRzU:nIdseIO+EZEyFjEOFqTiQmKnOHjzU
Malware Config
Extracted
Family
neconyd
C2
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
resource yara_rule behavioral1/memory/2420-1-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2424 2420 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db7fd9d0c2d889846bada4b4a8834fc0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2424 2420 db7fd9d0c2d889846bada4b4a8834fc0N.exe 30 PID 2420 wrote to memory of 2424 2420 db7fd9d0c2d889846bada4b4a8834fc0N.exe 30 PID 2420 wrote to memory of 2424 2420 db7fd9d0c2d889846bada4b4a8834fc0N.exe 30 PID 2420 wrote to memory of 2424 2420 db7fd9d0c2d889846bada4b4a8834fc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7fd9d0c2d889846bada4b4a8834fc0N.exe"C:\Users\Admin\AppData\Local\Temp\db7fd9d0c2d889846bada4b4a8834fc0N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 362⤵
- Program crash
PID:2424
-