Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 22:22
Behavioral task
behavioral1
Sample
8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe
Resource
win7-20240903-en
General
-
Target
8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe
-
Size
61KB
-
MD5
caf1961e3d4995061f68efa7da281090
-
SHA1
525894d37e524fed84e86b949e1192add8ea666a
-
SHA256
8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9
-
SHA512
248bda9ffbda6d98a28f558732aee9ba6da9ea421faec01494b72d79fdb112f3ff9016e041e1902779e95dec413c38fe130702a7f08123fa9afebaec1ec080e1
-
SSDEEP
1536:sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5:UdseIOMEZEyFjEOFqTiQmFql/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2924 omsecor.exe 1164 omsecor.exe 2892 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2656 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe 2656 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe 2924 omsecor.exe 2924 omsecor.exe 1164 omsecor.exe 1164 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2924 2656 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe 30 PID 2656 wrote to memory of 2924 2656 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe 30 PID 2656 wrote to memory of 2924 2656 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe 30 PID 2656 wrote to memory of 2924 2656 8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe 30 PID 2924 wrote to memory of 1164 2924 omsecor.exe 32 PID 2924 wrote to memory of 1164 2924 omsecor.exe 32 PID 2924 wrote to memory of 1164 2924 omsecor.exe 32 PID 2924 wrote to memory of 1164 2924 omsecor.exe 32 PID 1164 wrote to memory of 2892 1164 omsecor.exe 33 PID 1164 wrote to memory of 2892 1164 omsecor.exe 33 PID 1164 wrote to memory of 2892 1164 omsecor.exe 33 PID 1164 wrote to memory of 2892 1164 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe"C:\Users\Admin\AppData\Local\Temp\8615324a97f5362ed0161b5da39289e29d1cd08f5486e757d8eba5adf37ab2a9N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5a16d305dc41b50723437c44f65a3bd1c
SHA16832f4d61dbc63b6bb4f6dd9388ae86fc292f0c2
SHA256fd588c37043e77158e8de024f6ea3112e57a00b1cf8449f4e20418c33f43c5fb
SHA512c1b921f578be362134a74a16e0037c74f25d83772906e3c143146f96c8335a1173daba776b154fd146095e4a9158f4cfab40e70efe449311127f2e999c580c6d
-
Filesize
61KB
MD57774235d11c23d84fffe392a33c3c393
SHA1d46565222a3b7b1c5c5b4d06631bcecaaa496c50
SHA256140e88b048fb20ecb3894185df6028e9283d1bf15292ef4e8c944775cbdddcaa
SHA5128469bfbb2f1b69fe98793fcc857de5ab872fb63130ae9a5f531c45fc151b86e312056899bc3525794c9ae5c18cc21be085a6bde809af005d88da3a9c77f5df38
-
Filesize
61KB
MD568be9758ac808f5e379a75137203b313
SHA12e0fa15e4e98e2d72651c19dc4c06c421db8b29c
SHA25612ea707d6783155d5625dfa443d5b061a7465ba640737a671c846ee5f0a70830
SHA512da8b003aeda869444aa755bebe42aeaf9f0900220385f4b07d8bed60deba947469c7344bb56f3fa135863ad1f216049d09b704cfd094c5672082ff1a6961a387