Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 07:32
Behavioral task
behavioral1
Sample
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
Resource
win7-20241010-en
General
-
Target
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
-
Size
71KB
-
MD5
6d3c3df79012ec40a3ba1614656c0099
-
SHA1
0b55f5ceec915b607b1affdd2e95ceee903a4ff9
-
SHA256
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92
-
SHA512
0e8e040f70d984097b83907da7e46c428b7910034ae529d365d6cd5490ac908015737a0c38e9ef426a38d2b2dd25b70ccd041c5014bd7dc137404ac9ec2caa5b
-
SSDEEP
1536:gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHF:AdseIOMEZEyFjEOFqTiQmQDHIbHF
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2380 omsecor.exe 2896 omsecor.exe 1856 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1692 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 1692 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 2380 omsecor.exe 2380 omsecor.exe 2896 omsecor.exe 2896 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2380 1692 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 30 PID 1692 wrote to memory of 2380 1692 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 30 PID 1692 wrote to memory of 2380 1692 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 30 PID 1692 wrote to memory of 2380 1692 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 30 PID 2380 wrote to memory of 2896 2380 omsecor.exe 33 PID 2380 wrote to memory of 2896 2380 omsecor.exe 33 PID 2380 wrote to memory of 2896 2380 omsecor.exe 33 PID 2380 wrote to memory of 2896 2380 omsecor.exe 33 PID 2896 wrote to memory of 1856 2896 omsecor.exe 34 PID 2896 wrote to memory of 1856 2896 omsecor.exe 34 PID 2896 wrote to memory of 1856 2896 omsecor.exe 34 PID 2896 wrote to memory of 1856 2896 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5544831c578b4780d95ba804000b0f67d
SHA1333ab43ae921baf46763ad5de733e6551e7949ba
SHA2562d94dac9e53702b513c338196f3c56a5c49978a6c3b2a863591d4310447b84ce
SHA51296d9c7fac6f9c3122c98f9798adb74cc7a5730696262e368bd4583f1e8548ebf3e521b76ad94ff3fab433bdd080fcf91efbf055eaa175d76af419cd4d5273434
-
Filesize
71KB
MD5b5e9ad108b7e1515b83f8ec4b63ecacb
SHA11743f9ddb40d39a15f0399b09eaf47a8f5be9097
SHA2568e74ffbe47f70408efd22ff498ed39d7255fe56474dc0c3363de1008151e344d
SHA512cc9618ac5b10e01f3ace4c65717cb888854a0563ad2a1434aca8fa457a55a1190ea8e606ecd171f02cf75b3f6c24e416b814101b2e6a95189f77ab84228bdb04
-
Filesize
71KB
MD568b4b83402a6798bccc699998a5ea54f
SHA1e1159decdda9677671481ad6a86fa8f079fb6008
SHA256f8c0b67032eb8aa84f474457af44d8ebf4a83dd3bfe7856f9c29599cdec2501c
SHA51270e836b9e5ad501af079ca3025f3c29558d011b416b18467a26dc7ee5793f4184234eb8278de8f1c730540fd3cf041478654819b08c7bb675e083a26152d8180