Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:18
Behavioral task
behavioral1
Sample
30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe
Resource
win7-20240903-en
General
-
Target
30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe
-
Size
80KB
-
MD5
7029ae0bc40f5db9c20b8253ac405240
-
SHA1
2d399015472e8ad47044781c979edaef599e5047
-
SHA256
30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1
-
SHA512
4c7f97e3c32dd1323e8adcc12b521b9c489003324cea7577b52ff771a793cf1fd8fc0e86707e18199b55c67dc32951d24b36323564576178242fbf012954eef8
-
SSDEEP
1536:Cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:ydseIOMEZEyFjEOFqTiQmOl/5xPvwX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2108 omsecor.exe 2076 omsecor.exe 1472 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1152 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 1152 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 2108 omsecor.exe 2108 omsecor.exe 2076 omsecor.exe 2076 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2108 1152 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 30 PID 1152 wrote to memory of 2108 1152 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 30 PID 1152 wrote to memory of 2108 1152 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 30 PID 1152 wrote to memory of 2108 1152 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 30 PID 2108 wrote to memory of 2076 2108 omsecor.exe 33 PID 2108 wrote to memory of 2076 2108 omsecor.exe 33 PID 2108 wrote to memory of 2076 2108 omsecor.exe 33 PID 2108 wrote to memory of 2076 2108 omsecor.exe 33 PID 2076 wrote to memory of 1472 2076 omsecor.exe 34 PID 2076 wrote to memory of 1472 2076 omsecor.exe 34 PID 2076 wrote to memory of 1472 2076 omsecor.exe 34 PID 2076 wrote to memory of 1472 2076 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe"C:\Users\Admin\AppData\Local\Temp\30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b01cfe68b63834ebb86c70bdffca334f
SHA19c4d05d71a2fdcfbe2144c4e61fa456019c54d85
SHA2567805e31a0b5361fef9276753c2480e5f96d1925585bb36b37ad3f12a39bd7c4d
SHA51203cd171dd0d8395dd7188307b934b9661c0cc33632a89021ec2758da86fff68729514429b7e8ce6a07af981756914900e3cb5e29aad805e45b14b1caed847738
-
Filesize
80KB
MD5f5addf62b9ee0aa3429f758c5c44b75b
SHA1dc2be4a40cb9486c02e5ed9a881296160bf56f20
SHA256a236a4c87446094b76f174d879ae2b84bb07906ddc64537e820f88f4441ee40d
SHA512c21438681f0825bcac34539821eec723ab56e31ab95e4274b81523eee42a4da5a0a216d161879ea8de861080146130490ce1cb834e04d177ffce1304eadd52e9
-
Filesize
80KB
MD55c88a58ef21a2729316fde1f8b0d1dc1
SHA1de74d53ae5aa922068864d9c268f9fa9bddd4d85
SHA256be4c554fa5a703179b91af45b4378ca9838cec9d070f91c96e1a0c9168c5f312
SHA5121e4a30230ab5fbca3b84c86ed767d816573cb75fba33a71c691da7a9346f6c824bed1db8f197ec29312ad8b30c11d329e4eef22118b215e5c7abe6dc5f20b715