Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 20:12
Behavioral task
behavioral1
Sample
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
Resource
win7-20240903-en
General
-
Target
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
-
Size
80KB
-
MD5
96118f09644ca13af64fe49b35b0e320
-
SHA1
eed96488981cf3dff1697b845a8a0ff6ea6b0c08
-
SHA256
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d
-
SHA512
5a8bf5d6bc2f621f42cde2bcea3b626b2501e913356b93c46a79019c633e0c59918708cfc85fe97abf7fd0f8a50cfe083a9975ae6d8a0a4cb994b5a2bf7f6e3d
-
SSDEEP
768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAq:6fbIvYvZEyFKF6N4yS+AQmZTl/5y
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2336 omsecor.exe 1832 omsecor.exe 1028 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2124 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 2124 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 2336 omsecor.exe 2336 omsecor.exe 1832 omsecor.exe 1832 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2336 2124 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 2124 wrote to memory of 2336 2124 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 2124 wrote to memory of 2336 2124 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 2124 wrote to memory of 2336 2124 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 30 PID 2336 wrote to memory of 1832 2336 omsecor.exe 33 PID 2336 wrote to memory of 1832 2336 omsecor.exe 33 PID 2336 wrote to memory of 1832 2336 omsecor.exe 33 PID 2336 wrote to memory of 1832 2336 omsecor.exe 33 PID 1832 wrote to memory of 1028 1832 omsecor.exe 34 PID 1832 wrote to memory of 1028 1832 omsecor.exe 34 PID 1832 wrote to memory of 1028 1832 omsecor.exe 34 PID 1832 wrote to memory of 1028 1832 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD59a311e2b1f74160cb44241e8f792e6f3
SHA1dadf8b3a09e0f1b81f5fb15760fd6d1adee9445d
SHA25677a3d2bbc0416b8a0735b2ac38178f44853ab6932a806b0576ad70355b5bec9f
SHA51226214968b2cb10f12c6d4a7dac5ae9af3956b1e06485067fa9c52b055b97ec1c65a12d140c45d4bc639b34427fa0945288d36ffb8d777073377d876feeb8d867
-
Filesize
80KB
MD58898a61c920b728b23146d691a49a2fa
SHA12ebe0bb83ba38d3b4a515c776ec0580e79c0512a
SHA2562efa4475eb79d3529a94d31a0b256dea0a2e818fd4fbd43db1f472089d70ac62
SHA512b20de666de9b8b1204039cf19e8fdec9a0d761a353e5beb1c803775115e8783607f780a65a919613b9f0174552d48339ee6b0577bc8ec7e8930ce4336edb88ec
-
Filesize
80KB
MD55d73cc13d3da22253b8ee292cc01bbf7
SHA1ad0c222aae9c286ed1b19e9753de5b77bb737910
SHA256806745dfb210fcd621aa819ecdf0dc2c3ec7d07fe3cd6b262a7ea8e18ba2c404
SHA51248576d22050aa5a51f78d04058deb8757434b0c3aa79f2bcb6d8af70b67391cd91cc0b08964a1e44ded4db689429cc22e3fea9a55de9ff0bfb13b69a007ac108