Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 00:40
Behavioral task
behavioral1
Sample
01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe
Resource
win7-20240903-en
General
-
Target
01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe
-
Size
71KB
-
MD5
d588af58bca8629fe31730f728d519d4
-
SHA1
8fc9e20019467a2d59d0894bf8dd7becd39a55a1
-
SHA256
01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4
-
SHA512
334d6603c605ed9c29e52f4fc901b76472f50df72de52b051ed169633c2b215e1cc96f6f34a4561a924ab2948d84e75060eaaa171dafbc6294c458d3c0c19c0f
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHH:RdseIOMEZEyFjEOFqTiQmQDHIbHH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2408 omsecor.exe 1408 omsecor.exe 584 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2084 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 2084 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 2408 omsecor.exe 2408 omsecor.exe 1408 omsecor.exe 1408 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2408 2084 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 31 PID 2084 wrote to memory of 2408 2084 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 31 PID 2084 wrote to memory of 2408 2084 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 31 PID 2084 wrote to memory of 2408 2084 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 31 PID 2408 wrote to memory of 1408 2408 omsecor.exe 34 PID 2408 wrote to memory of 1408 2408 omsecor.exe 34 PID 2408 wrote to memory of 1408 2408 omsecor.exe 34 PID 2408 wrote to memory of 1408 2408 omsecor.exe 34 PID 1408 wrote to memory of 584 1408 omsecor.exe 35 PID 1408 wrote to memory of 584 1408 omsecor.exe 35 PID 1408 wrote to memory of 584 1408 omsecor.exe 35 PID 1408 wrote to memory of 584 1408 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe"C:\Users\Admin\AppData\Local\Temp\01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5792ebf8a97eac3a5791f30ce94ab93db
SHA1187256b276573b1990c5fdb2b4a7a1287f163c3b
SHA256634a4ac3b94135a0cbd2fc5e38331111651c5f53ab965c1a852d47392465139e
SHA5122f7d64419268ff04c39650616ee4a7c4d79015db7a0d1a9fbc2dc13a7ad4a43f907293035de1ece8cb4df49c9bd2c9c0749bda0c5f83aee71e542b22a303b087
-
Filesize
71KB
MD54114339b669271e46495ade7cda945f3
SHA1c89930da3388494bb9079aa84b26d227382e5dac
SHA25630ba82186b508c068e8ea155f8ac08188321a05933a57a45cf8532cc56d8c4f5
SHA512668a16438d524764ae1a13c5dd02dcd63aa46511375033522238b08ae4f38b7ed312b75abe3572dbc6cb5f288434385a7cec67268641a9056f46100660e259ab
-
Filesize
71KB
MD56c0e2b81ecad4c38ab428427e93083bd
SHA1f6f5f16958ee0d238d138f5bbddd9ce10ff9f5cf
SHA256fccfbcb19153ae931d603f430f02d015f1a9db1c77b096aa4bd98dc949f8ac2c
SHA51244d41fb103053449c60fcc48652bc508c132741a3711ac61e66c8b13d6fae8f98146adecc144da2f041dbeb24a7617c752f4f95790f744d622e9eaa680302a60