Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 01:15
Behavioral task
behavioral1
Sample
8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe
Resource
win7-20241010-en
General
-
Target
8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe
-
Size
90KB
-
MD5
6a95558edb58d716532ccd8add56f032
-
SHA1
3a31fe63998a1ad9c1e406f0e4fc0c8f0076a190
-
SHA256
8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32
-
SHA512
0f14609da9d6b048d4ca5ae9e4430db81eadd201a1a71b709d9a40d939812cbab7176f7395e75676b19d0949043aaac129a1bd3803a72ed65fbfe807726b2a09
-
SSDEEP
768:PMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:PbIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2268 omsecor.exe 2280 omsecor.exe 2416 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2132 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe 2132 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe 2268 omsecor.exe 2268 omsecor.exe 2280 omsecor.exe 2280 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2268 2132 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe 30 PID 2132 wrote to memory of 2268 2132 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe 30 PID 2132 wrote to memory of 2268 2132 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe 30 PID 2132 wrote to memory of 2268 2132 8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe 30 PID 2268 wrote to memory of 2280 2268 omsecor.exe 33 PID 2268 wrote to memory of 2280 2268 omsecor.exe 33 PID 2268 wrote to memory of 2280 2268 omsecor.exe 33 PID 2268 wrote to memory of 2280 2268 omsecor.exe 33 PID 2280 wrote to memory of 2416 2280 omsecor.exe 34 PID 2280 wrote to memory of 2416 2280 omsecor.exe 34 PID 2280 wrote to memory of 2416 2280 omsecor.exe 34 PID 2280 wrote to memory of 2416 2280 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe"C:\Users\Admin\AppData\Local\Temp\8eef017b3d7fa6ad6393f6fdbee9a9efd83f398bbb2884f555dba978e8f28b32.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD58b69984e8f68f71fc256ed37aaf60f5a
SHA12e37313c1338295f2f9c651aba5d0aa17cf61b1f
SHA2561af041d349e512e5fc79e69b8ecbc53182e451e70713035eb1a73b176f63c7c8
SHA512c442fb407ffd525824ec065d18f71c16e922fee0c003900d7c6b44d95d70026d5a8e99c96d89df6a9838aa58af8fd6749aae5b28a353969f90c52b928e791dc7
-
Filesize
90KB
MD529cd3459d428232794b9df31cbb19caa
SHA16e8e2ee5949daabbc1a25ec7a61191349774bf72
SHA2568091252dcec3ecaef41412b8ee71bf1da9b63f7da038273a0a357e5a6d39be31
SHA512c4c43acc3a2cd77924d634428c6770de2708aaa6faba4beb862d65245e9d158955a2e41ea6e1383a6f31dcc824446033b00b58b39eb409ce6f84cf664c4d7c24
-
Filesize
90KB
MD5236d9d57e2421d080c22c41f26ed9139
SHA15e8ac3448f2c98bbbe0208172829ca820b3fe0da
SHA2564e73470bc3b1b6c88c6eb9f837f4b6f20fec03bea8ef9d06d4bcb5b6cc5e15b0
SHA512671fbf206a7a7056a4b500b7911de9ff994528c33b555f3d324007d6e4008b65eceb8dffac1b6b301917b98c11b4236d082f382ec45fd3ad5658cc788fb5cb6d