Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 21:15
Behavioral task
behavioral1
Sample
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe
Resource
win7-20240903-en
General
-
Target
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe
-
Size
76KB
-
MD5
1d5068159e726464c241156656cdb657
-
SHA1
091f1d503d1b064e894690bd97c24102ac9a8737
-
SHA256
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783
-
SHA512
515c222061d450fd686c384efeebe55ad7bf44c4ef73789d6262e7f0bbd2547ab8ec63f4991bae687f47c57059d76f579ca365518d624a0ea52f889644bc39a6
-
SSDEEP
1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:XdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exepid Process 2308 omsecor.exe 536 omsecor.exe 2052 omsecor.exe -
Loads dropped DLL 6 IoCs
Processes:
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exeomsecor.exeomsecor.exepid Process 1720 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 1720 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 2308 omsecor.exe 2308 omsecor.exe 536 omsecor.exe 536 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
omsecor.exe2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exeomsecor.exeomsecor.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 1720 wrote to memory of 2308 1720 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 31 PID 1720 wrote to memory of 2308 1720 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 31 PID 1720 wrote to memory of 2308 1720 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 31 PID 1720 wrote to memory of 2308 1720 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 31 PID 2308 wrote to memory of 536 2308 omsecor.exe 33 PID 2308 wrote to memory of 536 2308 omsecor.exe 33 PID 2308 wrote to memory of 536 2308 omsecor.exe 33 PID 2308 wrote to memory of 536 2308 omsecor.exe 33 PID 536 wrote to memory of 2052 536 omsecor.exe 34 PID 536 wrote to memory of 2052 536 omsecor.exe 34 PID 536 wrote to memory of 2052 536 omsecor.exe 34 PID 536 wrote to memory of 2052 536 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe"C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2052
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD566a2c31b3916d7cec1c2deb50342d249
SHA12a47d17e240c08541ed88934be5ad7a1110c00da
SHA25676aec3689d9f98a213b5eccc20c68ccc4453ae045dec3d52d3ff172684cd7a3e
SHA51289824cd571c455f1fc94a91e12d6b726fb70b45bfbf669e1ccf9818fde1dce041d0ca75a5e5ab144620a65ff51bd1e22c7ee4b61bec88f2d71a2bf1c659580f7
-
Filesize
76KB
MD5c93a5838747952c51fa7e19ff70004fb
SHA1b4a70a0d05c59bec961f12f32378b38c03f33196
SHA25603bc3e1478230a2830858666e08d924d03ff8d29e6ef7b285508326c4d96276f
SHA5125cfaf6acf1c774fb9dc231a1859d0edebe2ce25027af97e42e199276f2ecc89ac17d66fc81fb1218abe33589379f460b38b1bff7e2758848d1f082f4b7effa5b
-
Filesize
76KB
MD5837d6aead372152ea6d52e8e4216ab15
SHA1bba5eafd30bc2d9f69beaf5e79692866b79c891a
SHA256e807c4345e102ffdfe127b11851c71d1211215b05fef153cc7305c02157ca7fe
SHA51286837b2db09657b41b6a02456b6559387f79b2851bf100b45d4e9d55cbd38238f06af6bbf65a29c44b4d51452d8b7eca681f30ff7e46d750aed11e1c4d00b814