Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 15:04
Behavioral task
behavioral1
Sample
7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe
Resource
win7-20240903-en
General
-
Target
7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe
-
Size
61KB
-
MD5
f7938e985ac3dfd794c4f707c8bc6f40
-
SHA1
beb039cba31e32b2ff7987e6cbf81327ab6f7fa3
-
SHA256
7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600
-
SHA512
1864ee7697bd231a60bc2d0d3fc4fc33bcdc9550a2c7e1e179420c7b6062177376bb501bdeecc696a639d06a7db3d013a72f229e982e91b29c01413cb8c1c0dd
-
SSDEEP
1536:Md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZWl/5:0dseIOMEZEyFjEOFqTiQmUl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2356 omsecor.exe 1808 omsecor.exe 1784 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2380 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 2380 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 2356 omsecor.exe 2356 omsecor.exe 1808 omsecor.exe 1808 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2356 2380 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 30 PID 2380 wrote to memory of 2356 2380 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 30 PID 2380 wrote to memory of 2356 2380 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 30 PID 2380 wrote to memory of 2356 2380 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 30 PID 2356 wrote to memory of 1808 2356 omsecor.exe 33 PID 2356 wrote to memory of 1808 2356 omsecor.exe 33 PID 2356 wrote to memory of 1808 2356 omsecor.exe 33 PID 2356 wrote to memory of 1808 2356 omsecor.exe 33 PID 1808 wrote to memory of 1784 1808 omsecor.exe 34 PID 1808 wrote to memory of 1784 1808 omsecor.exe 34 PID 1808 wrote to memory of 1784 1808 omsecor.exe 34 PID 1808 wrote to memory of 1784 1808 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe"C:\Users\Admin\AppData\Local\Temp\7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5c738143fd870ac9226a6b9ae845aaa6a
SHA13712dfa2bc5481aff3da1caedd38bfe7be035c8c
SHA2562cd2846b595784c9c62584d2488e62baef8ab24ab5841abd31bbd8c90f24e6ea
SHA51238a896211019754ee4ab0a653679d373121c18e27820ae4f127a9bd5be3df3c8fed2b2e54e11d28c4e541e8d921fd894af56e8f6a7bf2eb1f78e241a9b00a07e
-
Filesize
61KB
MD50a7b590b30aa4b5f122ef7908897c999
SHA180dce1b10b883dbdf6790c7c4d05e6c0e706d7c2
SHA256beceee11edb6302a43619da059985b2ea53d03ef64b8c706e16fd1c56f42dcdb
SHA512e1c93270477a614f83dc3452a26949308f520a31f11ea9f253ea6fd915bb5d3b65996bccc26192754460738ddbdf8abf67375eb7632384f267464445ee17f15c
-
Filesize
61KB
MD5b109455731c1ceb2153683054b5c167a
SHA1df8c878d1b8a3b3c758961cdf367587e6c6dabe6
SHA2567dd52b0a6890cda7d052b86d1d4ee8c530f6a2609eccd7b78a13deaf8c5fa1e8
SHA5127a90150adfacec6d47b188654b570bb67866b89138895d0ac92a1640a9ba2a84d31d70ece296c83a2ae453e415002865196cc5ac0ca2f967c2013cfc41da0614