Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 23:42
Behavioral task
behavioral1
Sample
68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe
Resource
win7-20240903-en
General
-
Target
68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe
-
Size
92KB
-
MD5
587b6d81e23b25972132a72f2bb24d17
-
SHA1
dfff9825cbe8dcdfd2792990b7ad0cd9922a5b5f
-
SHA256
68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399
-
SHA512
11023f3a3e2c771d18a0f40313e230b035004a3df2691838fb47b2b31f7f5d01b23cae68b60d21e87c261f4ad4f5d4d7eb61c7bef5eed8e48199af922619e223
-
SSDEEP
1536:5d9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5:ZdseIOyEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2092 omsecor.exe 1328 omsecor.exe 1520 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2068 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe 2068 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe 2092 omsecor.exe 2092 omsecor.exe 1328 omsecor.exe 1328 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2092 2068 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe 30 PID 2068 wrote to memory of 2092 2068 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe 30 PID 2068 wrote to memory of 2092 2068 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe 30 PID 2068 wrote to memory of 2092 2068 68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe 30 PID 2092 wrote to memory of 1328 2092 omsecor.exe 33 PID 2092 wrote to memory of 1328 2092 omsecor.exe 33 PID 2092 wrote to memory of 1328 2092 omsecor.exe 33 PID 2092 wrote to memory of 1328 2092 omsecor.exe 33 PID 1328 wrote to memory of 1520 1328 omsecor.exe 34 PID 1328 wrote to memory of 1520 1328 omsecor.exe 34 PID 1328 wrote to memory of 1520 1328 omsecor.exe 34 PID 1328 wrote to memory of 1520 1328 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe"C:\Users\Admin\AppData\Local\Temp\68071d20870b8833e1220a00f5486a421642ecff7f29951cf1fe7eb646441399.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5d75fa29c872c683fe0e2fa4963dc1754
SHA1c6c5d9bc6e58604a488d3c35b449593cb41e0c7c
SHA2567af5941911e04475e969b4dce5c0dfd8c00e261294614c084e58e0ff71c50950
SHA512fb5d1780fc957c36b8731a79ad668447d89f4d22c50007abc7c1f3b1e308dc90104692da36dce1b9eea120288c9f7543f5824050a935ea2a649fad667b7811e2
-
Filesize
92KB
MD54cfc3d4c6d674711fd5ec72929d0906b
SHA129e03538de342a49ed377cc52143a488da386f44
SHA2564752ea0272bc23e4141417e5d4dbab1f5611e608c9a1e0aa71331dfb5736322f
SHA5125443375e6d705f07b2aea9cb7e3452261c6beb9a6e66b679d6d24f5d076d51ff90060a1b461628c4b614a85fe498afdeafce3d3f81a85478b528edc5391a6245
-
Filesize
92KB
MD56433b71b1c915fd003c4feeaf4dd3c37
SHA1c3f30a7ed97f2e9f9df3536aed003229a39467bf
SHA2567f52c702e0059abad8af41472000a260ffdc204b22c219a7a36cddde147ed6c1
SHA5120290093df044298927110548104817e83115590465524f5075eabb68b7bf073c5e39da79c2e426fc5f792a2212d969f45923928894c7cc7fccdc88514a6760d7