Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 17:47
Behavioral task
behavioral1
Sample
e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe
Resource
win7-20240903-en
General
-
Target
e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe
-
Size
80KB
-
MD5
227e53f0ecbc0c1e7cdf9c00ef1fec50
-
SHA1
b52435e2b680c2ac4f6a81ba5fa14154c62346b4
-
SHA256
e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90
-
SHA512
272e81a405148b4e91b5461543a112e2ff84ccdd3bbdce9e79112543b710ebed59718c0152125698406cc619e16bc314f5dea561369c1fb6e8263a663bb6cac8
-
SSDEEP
1536:Pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:ndseIOMEZEyFjEOFqTiQmOl/5xPvwX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2736 omsecor.exe 2880 omsecor.exe 1980 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2688 e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe 2688 e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe 2736 omsecor.exe 2736 omsecor.exe 2880 omsecor.exe 2880 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2736 2688 e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe 30 PID 2688 wrote to memory of 2736 2688 e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe 30 PID 2688 wrote to memory of 2736 2688 e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe 30 PID 2688 wrote to memory of 2736 2688 e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe 30 PID 2736 wrote to memory of 2880 2736 omsecor.exe 33 PID 2736 wrote to memory of 2880 2736 omsecor.exe 33 PID 2736 wrote to memory of 2880 2736 omsecor.exe 33 PID 2736 wrote to memory of 2880 2736 omsecor.exe 33 PID 2880 wrote to memory of 1980 2880 omsecor.exe 34 PID 2880 wrote to memory of 1980 2880 omsecor.exe 34 PID 2880 wrote to memory of 1980 2880 omsecor.exe 34 PID 2880 wrote to memory of 1980 2880 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe"C:\Users\Admin\AppData\Local\Temp\e07000219d5f7df830d1e1fd05e160872ec0530ad4472713f9136f5076903a90N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD573e1d83d51ec1f6e9fa7b5781412f1dd
SHA135403f1239ee8a7ac22f8c304406f9d71c47ed63
SHA256286dac19bb8798299ce657831c9f3516680205f6432c04ac4745c6a390324bb9
SHA5124d436d6af5af70caa8d287a9652bb5103521f2f8aac10eb7dff3cf00d1f9701bda6a55fd92b6b5e570fae9092a5be4d37e218e5452cf9819ddae2eff62723824
-
Filesize
80KB
MD52e2e9eacc4a482722241a3cbdcf61e67
SHA174fd97246b203f0801c43ba448d57f7e33c342a5
SHA2560ccc701bda73d7c582b4df3d4e5f9c07faac2d4cba962821d967366384d31701
SHA5123f74a8fe85839ed69e9eec142a929e1ab352733689953db0003cb0d297aa0dae2cd358fd690d631c2c0838c5a84a476c0806252e9a09b1e232f267c1db7ec3fa
-
Filesize
80KB
MD57198427a11b83094d73441da03f11bb8
SHA1b2dcfa05adf9c21d4ffc88f7032f5b45e534a972
SHA256fc0b2d98f8d5e68a56e0a14873c18f0152df54b3c5825b3fdfb56fb731037872
SHA512528f3eb1028e35ac44057d4d285ce87693eae9a1e9d32b72fe60041e6f54a9ff75ac34deabff7bbb9e1b55b5118cb6e62c186312827bff05c308bc49520d63a4