Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 14:46
Behavioral task
behavioral1
Sample
d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe
Resource
win7-20240903-en
General
-
Target
d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe
-
Size
80KB
-
MD5
e69da5c3501445778de1cd41af270cd0
-
SHA1
a9178b211872ea64b90405bb72e383fc587ed2a5
-
SHA256
d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1
-
SHA512
f286bdbcf77142f5dd08b0a865c31c04b3aa5d288e00dadb43c527d572b1dadc9bbc6b0097f4c6491b18b681e9fa9cf9126b77bd6dcf461b9ec992259363e801
-
SSDEEP
768:mfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:mfbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2832 omsecor.exe 2944 omsecor.exe 2924 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2788 d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe 2788 d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe 2832 omsecor.exe 2832 omsecor.exe 2944 omsecor.exe 2944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2832 2788 d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe 31 PID 2788 wrote to memory of 2832 2788 d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe 31 PID 2788 wrote to memory of 2832 2788 d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe 31 PID 2788 wrote to memory of 2832 2788 d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe 31 PID 2832 wrote to memory of 2944 2832 omsecor.exe 34 PID 2832 wrote to memory of 2944 2832 omsecor.exe 34 PID 2832 wrote to memory of 2944 2832 omsecor.exe 34 PID 2832 wrote to memory of 2944 2832 omsecor.exe 34 PID 2944 wrote to memory of 2924 2944 omsecor.exe 35 PID 2944 wrote to memory of 2924 2944 omsecor.exe 35 PID 2944 wrote to memory of 2924 2944 omsecor.exe 35 PID 2944 wrote to memory of 2924 2944 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe"C:\Users\Admin\AppData\Local\Temp\d60de207dab4e3f0486b5ebcaf979bd7c055ac9b8ba6fcef802f685affc40fb1N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5366edc2c916d9ea71997aabe5f5f9312
SHA19c218926b9b134e9ef63e0478c34fab7de417f3f
SHA2567d49e69f78a5c2659dda4ae7141045efaeaabd56fc8283c9849ad893e173aa43
SHA512f724eb2792a6c8cb39d250b7e0ffd70780e01d8c892979155f86c957aeb5688fa66b9e7fa61b1a504aaea1192d2e0b19b6305eb64e44fb330108a54e13b01aec
-
Filesize
80KB
MD5a54928ff441d43a7ee56df6792841daf
SHA1f0ea62f093701d42931e66d1a46b82a1a50a210e
SHA256c09c88724c52bfdd37c85d329c991a864f3136174dba20ed6479b2cda6a4cdf6
SHA512b2caa710e5cea464acc7ca8a4a09afd40ffd784b18ad010caefca54cc87a566000ff799e6029508c607ebe2ff839b67b5148b3fba5dbd8065a109991f55ff660
-
Filesize
80KB
MD5dcbb1f34f8db7337d5af06b5ee276fc9
SHA1488e0e761c35cb925706435ce05243be290469ed
SHA256c790fdbb2f5e49a20d9f1cb91e1699f073f37d2a767f3ca47a992660196283c0
SHA51201e95fcc5e15585a72e0d0cdf32b592b5c9e040ff09547ee99ac8d0e8061e83aaaf331b8fb7b8d2060c9911f365b75a27922de06345186ca5336556a0c588d30