Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 00:37
Behavioral task
behavioral1
Sample
8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe
Resource
win7-20240903-en
General
-
Target
8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe
-
Size
80KB
-
MD5
4affced65f7e21ae8f762cdec29cc000
-
SHA1
f97e21b5cb05ba69532165946d39e52d0b57025e
-
SHA256
8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6
-
SHA512
580ef2762e6038af7534b5a355bf00dfb5b82010cdbf949b680d603b3fb92f592cd3dc6b7c4e4885b7d3a247c0e29acf97c51e62fca3428f2e04e0d5113574a4
-
SSDEEP
768:nfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:nfbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1992 omsecor.exe 2304 omsecor.exe 636 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2148 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe 2148 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe 1992 omsecor.exe 1992 omsecor.exe 2304 omsecor.exe 2304 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1992 2148 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe 30 PID 2148 wrote to memory of 1992 2148 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe 30 PID 2148 wrote to memory of 1992 2148 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe 30 PID 2148 wrote to memory of 1992 2148 8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe 30 PID 1992 wrote to memory of 2304 1992 omsecor.exe 33 PID 1992 wrote to memory of 2304 1992 omsecor.exe 33 PID 1992 wrote to memory of 2304 1992 omsecor.exe 33 PID 1992 wrote to memory of 2304 1992 omsecor.exe 33 PID 2304 wrote to memory of 636 2304 omsecor.exe 34 PID 2304 wrote to memory of 636 2304 omsecor.exe 34 PID 2304 wrote to memory of 636 2304 omsecor.exe 34 PID 2304 wrote to memory of 636 2304 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe"C:\Users\Admin\AppData\Local\Temp\8891257eb0c5f2f5174bb4d8263576f1c3db1ef337c1995970b12471d80c58f6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55c58e89f87ffd1d95af7d093fbd0b5fd
SHA1381e925e58de768820a291c4287459888a628276
SHA256fccc725c756d1d604aa4ac05e03c1819a9fab158065c3b7d7158b99f8440d4ac
SHA5124dc7f21be34a78b7b386eb4f305ceb597ec257463b627729f75faa727749df39b57c661bd7ba2cac440b898e61690b527eebe737629e8676ddd552d74a61d3e5
-
Filesize
80KB
MD58a5a2eb92a130a4c7f47158c93c69280
SHA1dd9884f542a058f70f9af743e05a164f8e0333bb
SHA256843525f83b4f25fffec2cad5ce7aae2d5c9dcdb887a0946a14c648f8828f3a3e
SHA512e07990832ff3d730f52a6d75c646e650a79d3480495dbb84b5468e860aae1030ce27a38bc113ad9d93eb3acd5db5270f83295acad306bfd6a62f68f3c94f9063
-
Filesize
80KB
MD534038f1eda08cc5586167ce3f92cc7f4
SHA176bedb5b44145692a61441b9f33239335f517c9f
SHA2564bb78fab7e48f9505b93a6f9df147e56cc77d3bd30e973fb7475fbe798d2ddd8
SHA5129abf0266a25fe860236cd1b36618860e2f7457c209944fea6510cb355c3cf7631026ec9c9bb868b2457b420a7968c2aa98fec820ba80a32ef218765ba98c24d7