Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe
Resource
win7-20241010-en
General
-
Target
e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe
-
Size
33KB
-
MD5
d7c40a64b0459499352df149608e092a
-
SHA1
da4fbf544f318a73fd942f181786273ded2f21c8
-
SHA256
e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7
-
SHA512
0747c603a2452753eacff673bb236865dfad713a341b94b7de8a1694f5d38621def56745588d5dfdb9e835b48b789d0c1e140702b698b8f0d4f41f380776e938
-
SSDEEP
768:0fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:0fVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2124 omsecor.exe 3060 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 972 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 972 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 2124 omsecor.exe 2124 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 972 wrote to memory of 2124 972 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 30 PID 972 wrote to memory of 2124 972 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 30 PID 972 wrote to memory of 2124 972 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 30 PID 972 wrote to memory of 2124 972 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 30 PID 2124 wrote to memory of 3060 2124 omsecor.exe 32 PID 2124 wrote to memory of 3060 2124 omsecor.exe 32 PID 2124 wrote to memory of 3060 2124 omsecor.exe 32 PID 2124 wrote to memory of 3060 2124 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe"C:\Users\Admin\AppData\Local\Temp\e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD55c4e31065a9199a78ede6553d5f7c7e5
SHA19544d2b5d8ccad2a2719b8ac72469d9ba38c3c03
SHA256a18dbc2c05e49fc0a61232a045416b29ec59f3856b553253302f2426670b38f1
SHA51232535e31e81914ebdad1dfa0244b14dce83de06be1470242b272f634e0df1886bea17aeb2c9b3963480b7db0a11a4809200048c3e052c93312cf6e4a7692f25f
-
Filesize
33KB
MD56aefd829de7df8b1a8cb09b56c512875
SHA167113a33bcaa64d373de3aaac29278fb3c80141a
SHA256bad27c3ac59bd3921fd8daaf0ec3c42afd12dd2fd3e9e9d38ca19ddb5bf38d90
SHA512b6d9223c8b58c5e394598fb7092defc638a08a7effb50566e97dbbcdec6e80df05329b5a0006b71b993e9a8688b84bae6490f4dd26b15e4063dd7a94c68d4ecd