Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 20:22
Behavioral task
behavioral1
Sample
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
Resource
win7-20240903-en
General
-
Target
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
-
Size
80KB
-
MD5
96118f09644ca13af64fe49b35b0e320
-
SHA1
eed96488981cf3dff1697b845a8a0ff6ea6b0c08
-
SHA256
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d
-
SHA512
5a8bf5d6bc2f621f42cde2bcea3b626b2501e913356b93c46a79019c633e0c59918708cfc85fe97abf7fd0f8a50cfe083a9975ae6d8a0a4cb994b5a2bf7f6e3d
-
SSDEEP
768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAq:6fbIvYvZEyFKF6N4yS+AQmZTl/5y
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2396 omsecor.exe 1752 omsecor.exe 760 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3048 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 3048 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 2396 omsecor.exe 2396 omsecor.exe 1752 omsecor.exe 1752 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2396 3048 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 3048 wrote to memory of 2396 3048 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 3048 wrote to memory of 2396 3048 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 3048 wrote to memory of 2396 3048 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 2396 wrote to memory of 1752 2396 omsecor.exe 33 PID 2396 wrote to memory of 1752 2396 omsecor.exe 33 PID 2396 wrote to memory of 1752 2396 omsecor.exe 33 PID 2396 wrote to memory of 1752 2396 omsecor.exe 33 PID 1752 wrote to memory of 760 1752 omsecor.exe 34 PID 1752 wrote to memory of 760 1752 omsecor.exe 34 PID 1752 wrote to memory of 760 1752 omsecor.exe 34 PID 1752 wrote to memory of 760 1752 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD59a311e2b1f74160cb44241e8f792e6f3
SHA1dadf8b3a09e0f1b81f5fb15760fd6d1adee9445d
SHA25677a3d2bbc0416b8a0735b2ac38178f44853ab6932a806b0576ad70355b5bec9f
SHA51226214968b2cb10f12c6d4a7dac5ae9af3956b1e06485067fa9c52b055b97ec1c65a12d140c45d4bc639b34427fa0945288d36ffb8d777073377d876feeb8d867
-
Filesize
80KB
MD50ea30f74509738757f1b6fca5a9f242e
SHA137bbf7375ce9a1c991a953b0762bcb116d555108
SHA25619da053de320033b9e65d81147f68c5bfa160a9d666ca8ff0ae88c4d48f28a0a
SHA5124549fab67344512e101e49b9413a2120a6466f34cebc08fecb0ecc77584abff0cc77aa430e080f07832b0ad59a8e33f3c5f60ed966ed36af12d64e95b48af3e2
-
Filesize
80KB
MD5533db1fce60771703eb5b9808fe8b24f
SHA16357c943ba55d9bc0c40b7179200f19a68d87a96
SHA25682d9288e34fc6ab8597b69956e7aa0bffd8129c7c71f2537087b5f95546c6c22
SHA512d91597b1e555a936f3f77186a258db84bb4fab155ac56480c4f95eefb404f8fed59064b77977a0024fc841081c771dd0196098612083f65d6576758eb9291fc3