Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 00:35
Behavioral task
behavioral1
Sample
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe
Resource
win7-20240903-en
General
-
Target
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe
-
Size
64KB
-
MD5
ba95bb9829385f2f3eb1a7d8a043f151
-
SHA1
3afc10065aee0791ef19e84375966c0165ea4eb9
-
SHA256
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe
-
SHA512
c2d71d0e421bdb77a7dd8799ffe158cb6728ce7467e64ed23597e7b060cd324a7dabcb691c32476be3570b06a27f17e63a794991165a7355efffc95df9baac74
-
SSDEEP
768:BMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:BbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2664 omsecor.exe 1844 omsecor.exe 1644 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2168 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 2168 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 2664 omsecor.exe 2664 omsecor.exe 1844 omsecor.exe 1844 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2664 2168 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 30 PID 2168 wrote to memory of 2664 2168 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 30 PID 2168 wrote to memory of 2664 2168 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 30 PID 2168 wrote to memory of 2664 2168 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 30 PID 2664 wrote to memory of 1844 2664 omsecor.exe 33 PID 2664 wrote to memory of 1844 2664 omsecor.exe 33 PID 2664 wrote to memory of 1844 2664 omsecor.exe 33 PID 2664 wrote to memory of 1844 2664 omsecor.exe 33 PID 1844 wrote to memory of 1644 1844 omsecor.exe 34 PID 1844 wrote to memory of 1644 1844 omsecor.exe 34 PID 1844 wrote to memory of 1644 1844 omsecor.exe 34 PID 1844 wrote to memory of 1644 1844 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe"C:\Users\Admin\AppData\Local\Temp\90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59e0a955da113d1de1e82afdf2e8464df
SHA161b531f015149c0c82aafc96903ae3557e574e39
SHA256ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009
SHA51295d18bd2e1d650ec2d0eb13cd4ffd9bb291313599510663a1def54b06e1e7074a7a4ec090eb2ccf3e19e262219834bd74405e9be352c426cfbb1d92cfa34f5bf
-
Filesize
64KB
MD52bbba78df73142cd22a9755bf45fcd6a
SHA12be72a7ae101a5cad3e0202ca1d98b1ca2a59bfa
SHA25670cc0f5bae759c0df498ea6340ad16cf5e11a7bdb27afa20f074e27793844cc8
SHA512a59bd4d38177c3928899df6dcc485c25b368a237bc68faf25ba704bc89cabe101d878fb4234a7130cd2898b6bf466909af472497538e9f8f72c8f65e6a1272f2
-
Filesize
64KB
MD5ad49b643bd3280f1a8f567b01d32efdf
SHA1cdf1010ac547ef66cde645e9f82e5a2990071326
SHA256753337feeb15c5d9fe10d3393c337c5ee978707cb853731f05b2fc897e73fd3b
SHA5122671de5c90bade611eb4628a7b573325befa7b636b58be09c69bad4368e5a999fcb3f2b2458b715d0998b8e4f7ac16be70bd4bac53b00936f54f3dc12a340906