Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 00:26
Behavioral task
behavioral1
Sample
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe
Resource
win7-20240903-en
General
-
Target
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe
-
Size
64KB
-
MD5
ba95bb9829385f2f3eb1a7d8a043f151
-
SHA1
3afc10065aee0791ef19e84375966c0165ea4eb9
-
SHA256
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe
-
SHA512
c2d71d0e421bdb77a7dd8799ffe158cb6728ce7467e64ed23597e7b060cd324a7dabcb691c32476be3570b06a27f17e63a794991165a7355efffc95df9baac74
-
SSDEEP
768:BMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:BbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1040 omsecor.exe 2496 omsecor.exe 2968 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2408 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 2408 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 1040 omsecor.exe 1040 omsecor.exe 2496 omsecor.exe 2496 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1040 2408 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 28 PID 2408 wrote to memory of 1040 2408 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 28 PID 2408 wrote to memory of 1040 2408 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 28 PID 2408 wrote to memory of 1040 2408 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 28 PID 1040 wrote to memory of 2496 1040 omsecor.exe 32 PID 1040 wrote to memory of 2496 1040 omsecor.exe 32 PID 1040 wrote to memory of 2496 1040 omsecor.exe 32 PID 1040 wrote to memory of 2496 1040 omsecor.exe 32 PID 2496 wrote to memory of 2968 2496 omsecor.exe 33 PID 2496 wrote to memory of 2968 2496 omsecor.exe 33 PID 2496 wrote to memory of 2968 2496 omsecor.exe 33 PID 2496 wrote to memory of 2968 2496 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe"C:\Users\Admin\AppData\Local\Temp\90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59e0a955da113d1de1e82afdf2e8464df
SHA161b531f015149c0c82aafc96903ae3557e574e39
SHA256ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009
SHA51295d18bd2e1d650ec2d0eb13cd4ffd9bb291313599510663a1def54b06e1e7074a7a4ec090eb2ccf3e19e262219834bd74405e9be352c426cfbb1d92cfa34f5bf
-
Filesize
64KB
MD58dea64e57d5e53c388b66b5208507d2e
SHA1c42c69d017d843e1982e7edd8b26b5b64d81bd09
SHA2565f3f6a19f6278bca91d3919b65cd64ef82054251023bc52d364b374043358bb0
SHA5128fc55c3398ce3a42c519a964f4fecac897d2b886e91f271ca96d867890c9fa46a105039b3e78e79746bb259e626e7239fabc990c98bee6800fbc133e2f04c2d1
-
Filesize
64KB
MD5adf10044e9aad71f7c448b47137b1f20
SHA10e8a63a98be90092c1eea5b07450d067d7c67034
SHA256d09f59a7f1a7ca416de7b02edfd7cd233b04f8a6c114b587d5000a4bd88110d5
SHA51298eac6f4cbd1036ecf894bb996c4ee0cf9d1e0cb17566bec1eb704b6e8d7ef5df206ef5e22e481136ad30504cf0fd025f9ff8c03d2d3a7e6f79e520d197688c0