Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe
Resource
win7-20240903-en
General
-
Target
7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe
-
Size
33KB
-
MD5
af75ff6f7d516b8f396e7ab5d0a2bc80
-
SHA1
3ce0bab9d5280283007fe420f311f42c0baeecf6
-
SHA256
7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3
-
SHA512
a85b438b16dac783c35b6b55ce8442c3727bbc7e0fa6a0cf073c9f72c02d210931eb8688842b61465efab2fad23a4013ecb5d0bc14ce3a6bf3c2b03d47819e64
-
SSDEEP
768:HfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:HfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2736 omsecor.exe 1000 omsecor.exe 2008 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2680 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 2680 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 2736 omsecor.exe 2736 omsecor.exe 1000 omsecor.exe 1000 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2736 2680 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 31 PID 2680 wrote to memory of 2736 2680 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 31 PID 2680 wrote to memory of 2736 2680 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 31 PID 2680 wrote to memory of 2736 2680 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 31 PID 2736 wrote to memory of 1000 2736 omsecor.exe 33 PID 2736 wrote to memory of 1000 2736 omsecor.exe 33 PID 2736 wrote to memory of 1000 2736 omsecor.exe 33 PID 2736 wrote to memory of 1000 2736 omsecor.exe 33 PID 1000 wrote to memory of 2008 1000 omsecor.exe 34 PID 1000 wrote to memory of 2008 1000 omsecor.exe 34 PID 1000 wrote to memory of 2008 1000 omsecor.exe 34 PID 1000 wrote to memory of 2008 1000 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe"C:\Users\Admin\AppData\Local\Temp\7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD52ec13f48466ac38d54d7002038c4a3cc
SHA16c49400b73496f471cb39d1bb75dc9a0bd180699
SHA2569c4518ff234dc60ad38c0b9d8381780cb8e25ccce85830a738b1861e9dde6a97
SHA51299bd90509bb079733427003ba5f4bb970c05521bfc2e3f4fa712ad8fc98948df42360361adf62149192c289110033e943fdbe0b3dc6c9c96bf1972d2b713404b
-
Filesize
33KB
MD5a4f71c1a07f013e405f1bc2758e895ee
SHA133b256f0849ee220735183c4a2f4668be200363a
SHA2561816eed7c7c88fc77bf5f668291b6e9a919dd82c8f8339d4db7a017f155fcd28
SHA512e0879230055968df60ee48cb94497c2292cbb8196e891f06d45322e302970f9d49413ef7a1e02f9eef61e49fed7f3505e8c83f81d4077c205ade32d711954502
-
Filesize
33KB
MD5dac009dc2068ab3bb1e9e547e8097761
SHA1b429b77b6406661d5203458a07d4973beedfdd51
SHA256b658ee81fa2f9341e41f1f1972b9904f333dff57b8e0a0debecd7942cac8cfd0
SHA51242797896f3ceab8dbe5297d2a9fd5c66571de7f796152a047f0b3a4263e8b79e43c431adc26c1d00923762a5ecab272b1901f5423824fcbd8827e04dbdb09707