Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 13:09
Behavioral task
behavioral1
Sample
aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe
Resource
win7-20240903-en
General
-
Target
aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe
-
Size
90KB
-
MD5
938312316541b2ea8df97ead25238756
-
SHA1
3c521109cb6909591eb61cced5ccc1ffd2dcf923
-
SHA256
aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4
-
SHA512
efb1179aca0f3f1e350e9e6a117297e7d24b41dc62fa16019926e0f27ab760f528f8bd71e121257f0d922368f6b1cab0029ce43e9a289a92bbb56eb6b1377d36
-
SSDEEP
768:yMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:ybIvYvZEyFKF6N4aS5AQmZTl/5G
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2720 omsecor.exe 1852 omsecor.exe 2912 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2756 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 2756 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 2720 omsecor.exe 2720 omsecor.exe 1852 omsecor.exe 1852 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2720 2756 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 30 PID 2756 wrote to memory of 2720 2756 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 30 PID 2756 wrote to memory of 2720 2756 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 30 PID 2756 wrote to memory of 2720 2756 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 30 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 1852 wrote to memory of 2912 1852 omsecor.exe 34 PID 1852 wrote to memory of 2912 1852 omsecor.exe 34 PID 1852 wrote to memory of 2912 1852 omsecor.exe 34 PID 1852 wrote to memory of 2912 1852 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe"C:\Users\Admin\AppData\Local\Temp\aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD58d690621cd20aa5428505dd0bd5a107c
SHA19088335cb566eb1d936fd2386dc0201cad66e93c
SHA2564933758db4701b2e9019d26f7459ed84748b2b57b8d3b5460a7b4c497eca6126
SHA5121bc4d9f6a4324aca728a0a06ab01dafddb2ba89f7b069fa2deec948f1c9eb9f6baa5244c273e204cf3f7b5b01c036872357368aa015ab6de9724b9e88b3e0cd2
-
Filesize
90KB
MD50fb225878b5af8207b556f52725f6418
SHA1eb5bb4279ea06a494774f953c370554305875790
SHA256c874082eac6db77c645af08d8ca4dbf98db83c3d6c17a7a5d3c28ad400e01d9e
SHA5122eccf22a80800135f3bbd80b9f772860e984e41007c68f9e5bab1833bc95234631b2b4df69bf1470d96ff036d23c02bde944f86c1d5b02b02208fddae85400e2
-
Filesize
90KB
MD54545c28c01ac6d59a28ae6efea959e5c
SHA1d039e5c417244ec06393dccba5f12066a4dd1cc1
SHA2564047cefaa71a27af69509981a6e7fc597ebf6272e2f4c7cb8e5a1ec926a9819a
SHA512882211f01988dc7509ed509fe089c3e92281cfd13bcc092a358f6985c6e24fb73f6ecacf7fc7822ecd090eb63dd246197ae330e2addec4da4b9dddb0e18fd3ff