Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 17:11
Behavioral task
behavioral1
Sample
a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe
Resource
win7-20240903-en
General
-
Target
a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe
-
Size
84KB
-
MD5
2d3031ef5928ba69c69cc9d93183782f
-
SHA1
88ec3b7af45ba54a5fa37638005d1f11769c2d7a
-
SHA256
a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81
-
SHA512
7d2d7fd0728d9511c3ae010dc241abc607a0f5e6c41dd0a93028463b7eac3f4bf26834fff34d756fd83cf9f56311b969d78cba2cd1b95017c08344db3dc58b2a
-
SSDEEP
768:/MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA9:/bIvYvZEyFKF6N4yS+AQmZTl/5l
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1980 omsecor.exe 2728 omsecor.exe 2572 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1636 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 1636 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 1980 omsecor.exe 1980 omsecor.exe 2728 omsecor.exe 2728 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1980 1636 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 28 PID 1636 wrote to memory of 1980 1636 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 28 PID 1636 wrote to memory of 1980 1636 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 28 PID 1636 wrote to memory of 1980 1636 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 28 PID 1980 wrote to memory of 2728 1980 omsecor.exe 32 PID 1980 wrote to memory of 2728 1980 omsecor.exe 32 PID 1980 wrote to memory of 2728 1980 omsecor.exe 32 PID 1980 wrote to memory of 2728 1980 omsecor.exe 32 PID 2728 wrote to memory of 2572 2728 omsecor.exe 33 PID 2728 wrote to memory of 2572 2728 omsecor.exe 33 PID 2728 wrote to memory of 2572 2728 omsecor.exe 33 PID 2728 wrote to memory of 2572 2728 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe"C:\Users\Admin\AppData\Local\Temp\a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5791303a56e79a3aa5bc61a4732d26d4d
SHA1442947fd13a12f56d22b3a5e9ad0b69395efe3bb
SHA256078bd58b4ef24744bccc03ca8791c3b223f2084e95ae5321b4ab4194b354ad46
SHA512a44616fc5630d2999509522723ce8d6778b436bb57b84f0960bb3ed078becb57d55ffeee96862536f70b7911f7131870ad9ad1dedabd3a3050a8f6be8028acc7
-
Filesize
84KB
MD53a92e2c4079ec45b27364281bef9424c
SHA1cdad930e43b307204040a0ebb01d74a74cae7d11
SHA2564f9926114ff137e48456dffd250318dedeaaaec1e12e65d9f462c11126fc2965
SHA512d7408f66760c83242a3edbfd99f59652c8e84af7f989ca5bd934f5ce391d4dfe983bd89261c90f82102a4739b60c518be29dd7a86ac8731f2f7b1b6502078af9
-
Filesize
84KB
MD5fb0f384a3e9ec1da68b45c4eb7c1aabe
SHA1960ceb88769f5767823d9990762ea7722d708ccd
SHA256887ceb7cea1101dd8bb0c99123cb21a6ce4d7b853ef087ac900796b2bd62c2ba
SHA51230ae801a2a896a7c772fbb8baf7acd930a11205363e79036d2939d7ada6e94afc0b20863ec7d281e2c15da11022131dae6565234d013888426329c50a5bf7a7b