Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 22:02
Behavioral task
behavioral1
Sample
4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe
Resource
win7-20241010-en
General
-
Target
4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe
-
Size
90KB
-
MD5
ed576037d42534c801be3e1bf101eaa6
-
SHA1
a14c6e7c04a49a1fb4bbeace71fe5604990c8540
-
SHA256
4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e
-
SHA512
45d2624e50ba4606899feb6261ab87471e6b8c93ca1a4bc4c0ce223e77fdeeb6cbf53f7c195dd022de8a9976e4e13e1b4100c2053c58f8f4be2dc61a0a8c062b
-
SSDEEP
768:sMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:sbIvYvZEyFKF6N4aS5AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2248 omsecor.exe 1932 omsecor.exe 2752 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2844 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 2844 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 2248 omsecor.exe 2248 omsecor.exe 1932 omsecor.exe 1932 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2248 2844 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 28 PID 2844 wrote to memory of 2248 2844 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 28 PID 2844 wrote to memory of 2248 2844 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 28 PID 2844 wrote to memory of 2248 2844 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 28 PID 2248 wrote to memory of 1932 2248 omsecor.exe 32 PID 2248 wrote to memory of 1932 2248 omsecor.exe 32 PID 2248 wrote to memory of 1932 2248 omsecor.exe 32 PID 2248 wrote to memory of 1932 2248 omsecor.exe 32 PID 1932 wrote to memory of 2752 1932 omsecor.exe 33 PID 1932 wrote to memory of 2752 1932 omsecor.exe 33 PID 1932 wrote to memory of 2752 1932 omsecor.exe 33 PID 1932 wrote to memory of 2752 1932 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe"C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD540774d67199bc0af539159785171ea47
SHA1c50cb7dd81c9b57e0026914fe0cdce9cbbff6012
SHA2567d1303035edaa270937d8d4f630a04013d66c162d02cb41c1ec9b4c9e64ddeea
SHA512c3c687582aa4aeb5fdf95a14df88d34372fa6324c939328dab48b57889dc4e7a7e3c6aa1ec032aa2727adcec4222950eab469a7750bc2b443e15646768469ecc
-
Filesize
90KB
MD5d13af31a54e40aafd4b97d542c9f32b5
SHA1230831bd42246bfdea18b485957b08f0af214a57
SHA2568107d244bb927d303d998db78de06bd0ed2b73a6040a7441af1818c9ae116eca
SHA512160035cd5228997d9c3a91f082c590553eeba8f9197f56abe02e819d00733c42f61fb686df0061a919c65e4c0df94552a1b1a3a5cb74e6ad837e4d2eae1d3ae7
-
Filesize
90KB
MD5441f3528716194866b220b7f24622767
SHA17e71ddb155b8d1879e21b09ebc06cdc73c24e14d
SHA256fb1b11c5bd60ddba419e6acbda6f56eafc0a19c487112938e1456cfe824fa674
SHA5126adb1b920102cfe92bf8b44f2d9d57f57739ec71af0bd7ac1813786e5cc8fbebe094f7cebcb669519468095cb745777ff5d0b4b75977dd0fc5567a61b8603109