Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 15:04
Behavioral task
behavioral1
Sample
7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe
Resource
win7-20240903-en
General
-
Target
7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe
-
Size
61KB
-
MD5
f7938e985ac3dfd794c4f707c8bc6f40
-
SHA1
beb039cba31e32b2ff7987e6cbf81327ab6f7fa3
-
SHA256
7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600
-
SHA512
1864ee7697bd231a60bc2d0d3fc4fc33bcdc9550a2c7e1e179420c7b6062177376bb501bdeecc696a639d06a7db3d013a72f229e982e91b29c01413cb8c1c0dd
-
SSDEEP
1536:Md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZWl/5:0dseIOMEZEyFjEOFqTiQmUl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2420 omsecor.exe 5084 omsecor.exe 3288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3192 wrote to memory of 2420 3192 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 83 PID 3192 wrote to memory of 2420 3192 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 83 PID 3192 wrote to memory of 2420 3192 7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe 83 PID 2420 wrote to memory of 5084 2420 omsecor.exe 101 PID 2420 wrote to memory of 5084 2420 omsecor.exe 101 PID 2420 wrote to memory of 5084 2420 omsecor.exe 101 PID 5084 wrote to memory of 3288 5084 omsecor.exe 102 PID 5084 wrote to memory of 3288 5084 omsecor.exe 102 PID 5084 wrote to memory of 3288 5084 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe"C:\Users\Admin\AppData\Local\Temp\7d7a143a035fe414fb73530625239f322f73f2a5094dfb6d26d28ae7d5958600N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3288
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD54bf1dc9c72222e6ad8bce72a1cb81931
SHA1f2ce1df2d9cb56bccfbf9f6a03ac825e2566cbf8
SHA25602dae3e9fafd62fc388ed55ec4ade0c4817f85dd0bc6aebac84923f14db667d7
SHA5126da920e851d2d93984aed3a2a4c7973929d07f4f2181fed1f1f870271a74bc0b9a627688a8201d9d267d8989985d1a884337db68531fdbb9c012c2f2e3ad7041
-
Filesize
61KB
MD5c738143fd870ac9226a6b9ae845aaa6a
SHA13712dfa2bc5481aff3da1caedd38bfe7be035c8c
SHA2562cd2846b595784c9c62584d2488e62baef8ab24ab5841abd31bbd8c90f24e6ea
SHA51238a896211019754ee4ab0a653679d373121c18e27820ae4f127a9bd5be3df3c8fed2b2e54e11d28c4e541e8d921fd894af56e8f6a7bf2eb1f78e241a9b00a07e
-
Filesize
61KB
MD54fcfc6e8bb83691d04fedecb3ea60ef6
SHA16f1e4083969c7ec33d6573470191f1fe04c180c6
SHA2567c76fa8be9faa939db2d03f8d256a940cb010d9f8c4eab56763e5fce2033a92b
SHA5123d53aa2cacfb74cdb50fbb30a5d3f8e06dfdd4180b18e6d2eb5f5f2f5b6db4c40883d6990309962e5225b4992b3279deec77081d6d665ceff2f1e5a5242770d9