Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 13:59
Behavioral task
behavioral1
Sample
3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe
Resource
win7-20241010-en
General
-
Target
3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe
-
Size
90KB
-
MD5
7596de0a78134f47afbb252e8de31240
-
SHA1
18de0d3f4a4873a1c7473458bc1f8c9cc76ec844
-
SHA256
3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70
-
SHA512
c0af3672c3e645764b03743dbeae561f0211445378d396a714150e16518f2e9f1123ca0abc67cfdf8d8046531d68c2937a1abe53016523bf79cc6a2fd068ec44
-
SSDEEP
768:OMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:ObIvYvZEyFKF6N4aS5AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2188 omsecor.exe 2832 omsecor.exe 2916 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2280 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 2280 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 2188 omsecor.exe 2188 omsecor.exe 2832 omsecor.exe 2832 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2188 2280 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 31 PID 2280 wrote to memory of 2188 2280 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 31 PID 2280 wrote to memory of 2188 2280 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 31 PID 2280 wrote to memory of 2188 2280 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 31 PID 2188 wrote to memory of 2832 2188 omsecor.exe 33 PID 2188 wrote to memory of 2832 2188 omsecor.exe 33 PID 2188 wrote to memory of 2832 2188 omsecor.exe 33 PID 2188 wrote to memory of 2832 2188 omsecor.exe 33 PID 2832 wrote to memory of 2916 2832 omsecor.exe 34 PID 2832 wrote to memory of 2916 2832 omsecor.exe 34 PID 2832 wrote to memory of 2916 2832 omsecor.exe 34 PID 2832 wrote to memory of 2916 2832 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe"C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD569d79a779068b41b77dc8ea4b49ad27f
SHA159ec448d768d400a70185e364decf95df233acd5
SHA256e931a9c1646b0058d11681456eddd4d2373a24ef7b772a4b7a02b8af7d4b7808
SHA51283496f4bd9bdbae3d7ff68a9b0e2897d589ebbac86797dd45202bdeaf72eb4b04c36d033b0d801e6d4d7dac871f62e9268c30345133d867e0c1ec60ed3179c56
-
Filesize
90KB
MD5269a7b84d3d1ad254f286fcd73a1f949
SHA15853386484b4956c30b2a247652c1f54c48af2ca
SHA256140960f6757aa183015b75fce14cadd3fb7765f8ac1830123253ea7ad94b72ae
SHA5120fa9a8945be8063f84c577f8dbfb7713b0d03dfa42e6e5e70d6fa314670dae45787766e5a4e77b7b27eb97e5e6969bc230ca662e898463dd8aa22951fc19161b
-
Filesize
90KB
MD5497c9190b4774d9ee867617db7718e79
SHA12a50a238b059217441f8ddc267f6e29c3f87245a
SHA2567fb6a68c7c83930cba5c1fea42a6fd95702e3c006170def370525476e5859411
SHA512c36f84ba89ecc2d03c13449ce22557c55483f4ffef78a1043b7f19677dd2999eb9db8a2f07a23ba2511babd145af06a3200d43d3cb31925b563877d7e1d862db