Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 02:27
Behavioral task
behavioral1
Sample
291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe
Resource
win7-20241023-en
General
-
Target
291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe
-
Size
76KB
-
MD5
6828d009f206a96c7bb7227850d8b380
-
SHA1
1f180115a642cf68492d05183dbfe0a210555b7d
-
SHA256
291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28
-
SHA512
6110aa557d970ed5a5f6263eec40c0d44f04b69f82cd89b8d07eeab25dc7f9720fb446e7bb6591b48d75656f4fa34cc48431cc181fcd44caf3b2452931b5fcbf
-
SSDEEP
768:KMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAW:KbIvYvZEyFKF6N4yS+AQmZTl/5O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2592 omsecor.exe 1108 omsecor.exe 1580 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2604 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe 2604 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe 2592 omsecor.exe 2592 omsecor.exe 1108 omsecor.exe 1108 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2592 2604 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe 30 PID 2604 wrote to memory of 2592 2604 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe 30 PID 2604 wrote to memory of 2592 2604 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe 30 PID 2604 wrote to memory of 2592 2604 291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe 30 PID 2592 wrote to memory of 1108 2592 omsecor.exe 33 PID 2592 wrote to memory of 1108 2592 omsecor.exe 33 PID 2592 wrote to memory of 1108 2592 omsecor.exe 33 PID 2592 wrote to memory of 1108 2592 omsecor.exe 33 PID 1108 wrote to memory of 1580 1108 omsecor.exe 34 PID 1108 wrote to memory of 1580 1108 omsecor.exe 34 PID 1108 wrote to memory of 1580 1108 omsecor.exe 34 PID 1108 wrote to memory of 1580 1108 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe"C:\Users\Admin\AppData\Local\Temp\291f3c0cf8f5cab4dcf2a9d4d9bcaf1bf1fb12aed3efb52adda441dbf7a3ef28N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD59f3aa080f624d0671d2ae3e27292600a
SHA17c745f68ea6d58ed65854ac51a2865fd7e53eb0d
SHA256c314c98d82168b2ac956c4d5b92b669dd65e4db536c129224e5ff8a9bee68a15
SHA5126ba872630df440a88533e73e0e84bf40b8e50cdd0568e4b9ae11386039aa8fa40939a4aef3ab69a2bfb0de4fc3d39dcaf0c2c4f4a09a3f87545e6568ba7f6db3
-
Filesize
76KB
MD57f7fbd01fa10c9aca4995fdb2c5ec277
SHA1abbdd5cd35376e83c61159e600e09641bab55325
SHA25600d5874ca9b7a7894f5a41da0186e39efb85373e43b73f585c4b4d72c88b2bd7
SHA51209bf6e768e294d288f88f979c3de45bc87592787b9881c350ec947fbf28bf902807071f23bb821cc15cb6eb67acb6812059b040a322e5e708d39aa8a8fdce929
-
Filesize
76KB
MD54fbfe1cab66b98931a37fe47884dabd5
SHA1e8a92c5e0b1785e6f864be4eba5a6837f93556d5
SHA2561d2e3aa46ca76699b30d5e50ad01e952316b3ed78fe850ac63d62e1063be8e83
SHA512b7a48fa9930cbaedba8aed0c2229d80c3f7e6198f5cfb04221b2a55fe23b5b9111eddbd75a1a0b4113ff820c027bcb6b67892614fa52065f4175d2f8e23db40f