Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 06:24
Behavioral task
behavioral1
Sample
ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe
Resource
win7-20240903-en
General
-
Target
ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe
-
Size
71KB
-
MD5
1d57dc0d23988bde925880eb770228eb
-
SHA1
e0418eaadda3bfaf6df8facf6f3dd60274b968dd
-
SHA256
ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db
-
SHA512
7014a031409ecd09326df5099e0078f9b704f552d8f1779612a7752174688d79eb69fa86141d2254fc82856b64c0a2eccb22b774c16ad4f3fa1bd42487a529fd
-
SSDEEP
1536:Qd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHH:QdseIOMEZEyFjEOFqTiQmQDHIbHH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3024 omsecor.exe 1740 omsecor.exe 304 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2700 ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe 2700 ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe 3024 omsecor.exe 3024 omsecor.exe 1740 omsecor.exe 1740 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2700 wrote to memory of 3024 2700 ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe 30 PID 2700 wrote to memory of 3024 2700 ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe 30 PID 2700 wrote to memory of 3024 2700 ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe 30 PID 2700 wrote to memory of 3024 2700 ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe 30 PID 3024 wrote to memory of 1740 3024 omsecor.exe 33 PID 3024 wrote to memory of 1740 3024 omsecor.exe 33 PID 3024 wrote to memory of 1740 3024 omsecor.exe 33 PID 3024 wrote to memory of 1740 3024 omsecor.exe 33 PID 1740 wrote to memory of 304 1740 omsecor.exe 34 PID 1740 wrote to memory of 304 1740 omsecor.exe 34 PID 1740 wrote to memory of 304 1740 omsecor.exe 34 PID 1740 wrote to memory of 304 1740 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe"C:\Users\Admin\AppData\Local\Temp\ba99f40d6d36dcdbc05a9e5d60ca469d836312c438a3281dc18ebcf525aac8db.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:304
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5985e33c2ea27ab93a5dd53570023c491
SHA122ab5dc11ab538d685480ebdd5e89d74749ccc76
SHA2564016162210561f46275b2e54249d15b4955d3a5b307f39f588136bcf8c4699ee
SHA51276523fec06120182824e4565f600ff905559a409c9c0e9cb116a87a41479f54930375896ef946d11e2e19e296b96bdd7931efb31fa4390f41160d1d21194db3e
-
Filesize
71KB
MD5431140213de6e147152758c8c7f3d0ad
SHA15cc75bfe6ab98f9a38fa153c7d85ea6eb0ab5ae5
SHA256b05d6186e36ff3de45f97a15734a57545c9335a77724a503705a07788cc13f5f
SHA512a225657c211bc31f28ec921d8acc17ccd412188e33e9012f03a56ad70804215e6526530b8155327f628ff459a89961fa1be0fc38ad528240dbf1d68f48d69126
-
Filesize
71KB
MD5186ed0c54fe815f43275006f922a3abf
SHA17fa110af1c1327f5c16e205f1672a324d7687e86
SHA2569ebcd57d092d185ff4f344fd204d209b390da5c5237a3f1c3d68394f16c1e307
SHA512a84d0257a068e0636715f7c2cf27f3af4531309850534b0870eb00c8d69de85037a151cd810e8770d01443bf713f07b2269652b20640bc7b1b5833da4e3f6e53