Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 18:00
Behavioral task
behavioral1
Sample
befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe
Resource
win7-20241010-en
General
-
Target
befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe
-
Size
61KB
-
MD5
0dba0775cc9b5926f94321ce001ee641
-
SHA1
bf65e0f7a8ec59dcb41f18ec8b3ecd491e17732a
-
SHA256
befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2
-
SHA512
0ee85611fa9fabdcb2c8ad1480b827726f283c2f93f1ef44d21ad47a35487eab27c5c8e24c3d7bf2d220f16752d15c446fcf294f905628d0a9478f02f9f13692
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZWl/5l:idseIOMEZEyFjEOFqTiQmUl/5l
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2904 omsecor.exe 3068 omsecor.exe 2264 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2580 befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe 2580 befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe 2904 omsecor.exe 2904 omsecor.exe 3068 omsecor.exe 3068 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2904 2580 befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe 30 PID 2580 wrote to memory of 2904 2580 befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe 30 PID 2580 wrote to memory of 2904 2580 befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe 30 PID 2580 wrote to memory of 2904 2580 befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe 30 PID 2904 wrote to memory of 3068 2904 omsecor.exe 32 PID 2904 wrote to memory of 3068 2904 omsecor.exe 32 PID 2904 wrote to memory of 3068 2904 omsecor.exe 32 PID 2904 wrote to memory of 3068 2904 omsecor.exe 32 PID 3068 wrote to memory of 2264 3068 omsecor.exe 33 PID 3068 wrote to memory of 2264 3068 omsecor.exe 33 PID 3068 wrote to memory of 2264 3068 omsecor.exe 33 PID 3068 wrote to memory of 2264 3068 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe"C:\Users\Admin\AppData\Local\Temp\befa2bdeeac47051ac9164f46b94dadf63aa4decb7e5007d5d6ffdf7876a52d2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD54e9b2fb8c4e3eb9450f9ebe81f5ac15d
SHA10e4178bdadaee6a44f44b0a712236246e89ff4eb
SHA2564eca7368eeb58ac6474cbc9e2da60904a01214e6d1b9891f77b06d8493a73fcd
SHA512ccddcd20d0f7954b584b6f3d08f688d755187668619ed3f729e53e919728d222f9b16db8e978010373303f0cdd58beac93ed22ab058b62f0f9bb8082bd1c3be2
-
Filesize
61KB
MD532faab10cff896763575db443e26f19a
SHA1ac3ad7da29df5b4112f2a957a4128e9c47c925fe
SHA25690fc04e0d0b289ad59643b848908ab0b119fc0ff83165764a3e9458a0797c484
SHA51287ea06b78b690bf699a718b35785ebe7bb422d400c5abc438a5e3a1dff08df6c1a6c1da3ede00b030e17037ae2b7acd485df80afac2a05b700ab96c90b10544a
-
Filesize
61KB
MD5a78e6cdbf3ebc6e349478287c9b0f7df
SHA11bb331533ac3419864173a0774c1e84a37c484cc
SHA256e98121326df99e794ef4951a9e347986c79df5063a1d2a472d077d442e22cdc4
SHA51226caddf706b359d4ae3e3bf78c23bc46244e3b34104f1184ceeb390171afd11058032c0acc398b7fbea7cdde0529a3490af7ca404dfab25e6543a2ac0d70c6a6