Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 13:21
Behavioral task
behavioral1
Sample
26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe
Resource
win7-20240903-en
General
-
Target
26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe
-
Size
71KB
-
MD5
955fa5469c2126f8d2b4ddf350ee3c00
-
SHA1
c0d7e9e882e51c1d44af4cd46ce55f5d9ed50162
-
SHA256
26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940
-
SHA512
6c30b08fb7df523f4dc5b74f06d164db5d6420f022a74fd9c2f52cf2644b287842b269c9fce8b04f22fd9d12b5d5a1df3232e317e0930e17404e0ac189cca50f
-
SSDEEP
1536:Qd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:QdseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1140 omsecor.exe 848 omsecor.exe 2792 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2312 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe 2312 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe 1140 omsecor.exe 1140 omsecor.exe 848 omsecor.exe 848 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1140 2312 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe 30 PID 2312 wrote to memory of 1140 2312 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe 30 PID 2312 wrote to memory of 1140 2312 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe 30 PID 2312 wrote to memory of 1140 2312 26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe 30 PID 1140 wrote to memory of 848 1140 omsecor.exe 33 PID 1140 wrote to memory of 848 1140 omsecor.exe 33 PID 1140 wrote to memory of 848 1140 omsecor.exe 33 PID 1140 wrote to memory of 848 1140 omsecor.exe 33 PID 848 wrote to memory of 2792 848 omsecor.exe 34 PID 848 wrote to memory of 2792 848 omsecor.exe 34 PID 848 wrote to memory of 2792 848 omsecor.exe 34 PID 848 wrote to memory of 2792 848 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe"C:\Users\Admin\AppData\Local\Temp\26d058323e818ffb41a2dc6bc503219e14c21484db0eff0738895c8f620ce940N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5941df87aa7eacc8a7acc26b3d405b06b
SHA1ad442e15f357147b218f021bb3e74b0535fd0584
SHA256716895f6c97c016a617d7159c4bdddb38c97108ae4c9a0fa80c0700196458f03
SHA5123aedcea9140c1c3de01899dbc5aa015b4433e1e520dbaa6b69a143a0a537793fe6abb28e6891b4d21b20077c4e1dd6cbd8bb91b5963a37e6a69119f23eb466bc
-
Filesize
71KB
MD51abacd77a571b6bc6548c60c9a5421ef
SHA1c445d29ba7d1ab9fb00d6e93c500d996f8788e06
SHA25642f61a4a33f97d3c498e4029d44d57b96f9de29e9f5a37c1357b58e1f3610b8b
SHA5120ef162741788aa36c4939a151f8cb452416b7e725db55f728fd83a18ad956a543f5ec5cfe6e61f1771aabe222a32b4f98ff287f0dfa4435ba1bbd8caeb3aec6e
-
Filesize
71KB
MD55b0fa1258bb9a4d9053b1f19fb736cc1
SHA1ac5c36c974c1b1efc2ef353cff0b2772cdfbffc0
SHA256a2a01b5c8c7309bcd6e49546807e8058d16c1300e9489cf908a304b63606cd35
SHA51240c838cfa86d2134c9306343527d4aca77611852f7566b3ac9c0fcf475812855895f8edc6b97eecdab425816405cc16b019e2ac30758891322c600143a114bdc