Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 13:58
Behavioral task
behavioral1
Sample
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
Resource
win7-20241023-en
General
-
Target
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
-
Size
64KB
-
MD5
83e03fbb59d718699eb7c7e3b056b11e
-
SHA1
0cb3032735883b2614e46afe3f83aa76baa55a86
-
SHA256
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7
-
SHA512
1fa730fabfa6cfd367478f19cb6e56ad9abd8e613b3ccbdeb9d23266f6a5eaf5e33150b4bfe108e9f841d69f19607ba2fc37e400d387756baebc8bce32f3f4a5
-
SSDEEP
1536:Ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5c:8dseIOMEZEyFjEOFqTiQm5l/5c
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2920 omsecor.exe 2220 omsecor.exe 2052 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3012 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 3012 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 2920 omsecor.exe 2920 omsecor.exe 2220 omsecor.exe 2220 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2920 3012 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 30 PID 3012 wrote to memory of 2920 3012 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 30 PID 3012 wrote to memory of 2920 3012 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 30 PID 3012 wrote to memory of 2920 3012 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 30 PID 2920 wrote to memory of 2220 2920 omsecor.exe 33 PID 2920 wrote to memory of 2220 2920 omsecor.exe 33 PID 2920 wrote to memory of 2220 2920 omsecor.exe 33 PID 2920 wrote to memory of 2220 2920 omsecor.exe 33 PID 2220 wrote to memory of 2052 2220 omsecor.exe 34 PID 2220 wrote to memory of 2052 2220 omsecor.exe 34 PID 2220 wrote to memory of 2052 2220 omsecor.exe 34 PID 2220 wrote to memory of 2052 2220 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD56a38c82b3c933a213b2597aca2357389
SHA17cdad1d2bb17c077d0efd77911f86753590ba9e8
SHA256d23899b8bb88abba3e5be103dd87a81b08ae31806eef4b987fc0a40e40d39959
SHA5120a7b9903ec4bde04c4e777a36d5335d1a65e5e0d1741b7c80dee57f0f432e8e22e1c0fd4f75921d88683b7beb728434bf4d6da735de3726d412d64795f9b11ba
-
Filesize
64KB
MD526dc856df4c5dcc108a99affd5c802cb
SHA1bbd30a4d4a6f13db5f043b95757cc5c09fe4e27c
SHA256b08cef0cc1e2e555fb4d392a902c20889c4aeaaaaab2cab8a63cd869025169de
SHA51253b41882abac115506733d15b058ecf727852ec2593f864a6247c9b96971f428bfa9b28f640745536add29994baec8863d06ddbc0f02660f9ea5ab9f3d6221be
-
Filesize
64KB
MD5804087fac92a5bbd1dc5d9d81305d37a
SHA10c3bc127da76ed5a54ad3d13c97b49ac063f4d0f
SHA256ad8774813737ce57224060028160c0e06093099d615c91a62b044084ff96e8e0
SHA5123f450af33efe0826031e26613f8998320cb1cc893fe800030f55b73d7164506efc339307cb173a12f2ba66dfb8742a10217f43b5c7d19372310bc39fd5e5cdfb