Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22/11/2024, 14:02
Behavioral task
behavioral1
Sample
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
Resource
win7-20241023-en
General
-
Target
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
-
Size
64KB
-
MD5
83e03fbb59d718699eb7c7e3b056b11e
-
SHA1
0cb3032735883b2614e46afe3f83aa76baa55a86
-
SHA256
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7
-
SHA512
1fa730fabfa6cfd367478f19cb6e56ad9abd8e613b3ccbdeb9d23266f6a5eaf5e33150b4bfe108e9f841d69f19607ba2fc37e400d387756baebc8bce32f3f4a5
-
SSDEEP
1536:Ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5c:8dseIOMEZEyFjEOFqTiQm5l/5c
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 588 omsecor.exe 1332 omsecor.exe 1744 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1628 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 1628 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 588 omsecor.exe 588 omsecor.exe 1332 omsecor.exe 1332 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1628 wrote to memory of 588 1628 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 31 PID 1628 wrote to memory of 588 1628 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 31 PID 1628 wrote to memory of 588 1628 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 31 PID 1628 wrote to memory of 588 1628 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 31 PID 588 wrote to memory of 1332 588 omsecor.exe 34 PID 588 wrote to memory of 1332 588 omsecor.exe 34 PID 588 wrote to memory of 1332 588 omsecor.exe 34 PID 588 wrote to memory of 1332 588 omsecor.exe 34 PID 1332 wrote to memory of 1744 1332 omsecor.exe 35 PID 1332 wrote to memory of 1744 1332 omsecor.exe 35 PID 1332 wrote to memory of 1744 1332 omsecor.exe 35 PID 1332 wrote to memory of 1744 1332 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD56a38c82b3c933a213b2597aca2357389
SHA17cdad1d2bb17c077d0efd77911f86753590ba9e8
SHA256d23899b8bb88abba3e5be103dd87a81b08ae31806eef4b987fc0a40e40d39959
SHA5120a7b9903ec4bde04c4e777a36d5335d1a65e5e0d1741b7c80dee57f0f432e8e22e1c0fd4f75921d88683b7beb728434bf4d6da735de3726d412d64795f9b11ba
-
Filesize
64KB
MD5c902252c60a1f637fddd3093af1e7333
SHA1f3cd33c3e50f1d4f67d025472685a1df9bd22676
SHA256758635e73ac3c74ceb78ca417c10c3a1d157331928e92caccb75e35a2789cf11
SHA51287bc932583c149fd5a642ffa954fbd5111ceaa8a16173cb709fb94c81d18b781480fcd2e378cf5bce5282e02558756f50e3cb4e14a7d4eca33400d4b0817cbf0
-
Filesize
64KB
MD52009937971a5aa647e4808b335dcd89a
SHA16765a4aa760bb3557afa89cf7637a66ec66a9e55
SHA25685a9a2d6401b1fe2b262b150ba0412f1de7c2cc37789a89fe392754faead6afd
SHA512cce34e831501d8cfc929ec7fabd91a4d2e4f19a1522d813ff09b8c09825bbd8ddf0209c4cce9d3cae7bacff0fc21331f4b2d5509a81c993928a3b0cd3d9fccfd