Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 20:33
Behavioral task
behavioral1
Sample
470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe
Resource
win7-20240729-en
General
-
Target
470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe
-
Size
71KB
-
MD5
cc57cf9a8fcce284133dc40eacd710c0
-
SHA1
a44cc04e818777e245724a71d1502e92edc39a72
-
SHA256
470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006a
-
SHA512
789269323fd940b3b980fcce475dbd6bf62c704133c5222b53975bafb09af4b5b43cddf6444e9d47394f7c5582e44116f18cabd1e1e7217effe7163ef3639032
-
SSDEEP
1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:3dseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2780 omsecor.exe 2032 omsecor.exe 1096 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2716 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 2716 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 2780 omsecor.exe 2780 omsecor.exe 2032 omsecor.exe 2032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2780 2716 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 30 PID 2716 wrote to memory of 2780 2716 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 30 PID 2716 wrote to memory of 2780 2716 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 30 PID 2716 wrote to memory of 2780 2716 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 30 PID 2780 wrote to memory of 2032 2780 omsecor.exe 32 PID 2780 wrote to memory of 2032 2780 omsecor.exe 32 PID 2780 wrote to memory of 2032 2780 omsecor.exe 32 PID 2780 wrote to memory of 2032 2780 omsecor.exe 32 PID 2032 wrote to memory of 1096 2032 omsecor.exe 33 PID 2032 wrote to memory of 1096 2032 omsecor.exe 33 PID 2032 wrote to memory of 1096 2032 omsecor.exe 33 PID 2032 wrote to memory of 1096 2032 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe"C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5f627e48f8af241dca7a9e896aeda1e70
SHA1bcb952b35f11c90c3969b83e32e4a2cd931d311c
SHA256734a15bd9beb9b3a954d473d6d84f69c50c7004397a1f56242a664fefdd2e043
SHA512ec5fe971c0565aa795025554464a430bb3b2c571e533006b7636cd5b4524920ffbb428e5d95e7787cbc59056fbfb314316d0774a6b0a49c90c45c39c296d5270
-
Filesize
71KB
MD5fd02dd2df34b1eea694eecc2fa903f51
SHA1583e41733f7ba73431e3aa7f1851d568e6fc519f
SHA25671ed84c59a2a833f709f0e61b1cfa64e914ec1cf00eaa7f64152b70b94f93112
SHA512cd68ed295c12f066bb7438ccea2203c551f2a35c051d941141c3c7f806f333b752fe4aa2042396a27d075c01bd87781470b15e1f0b74707faebf0eda2059fa75
-
Filesize
71KB
MD58bbcfcefd1cf7a6832e51ecfa088901b
SHA1677d09677f1f36b82dce0a8d487a579646d1a326
SHA256116561902938364a7ff4abf536895a26b1f2e725825a0e36970b45cce4f5cedc
SHA51278e0729089b2c85cb0af707ad126a1b0f494c8aba3bf0666950b426ac1482ecf8e67bc30f68900c09001ef881b3573c874a645239deb328174ad56728edbdd55