Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 11:20
Behavioral task
behavioral1
Sample
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
Resource
win7-20241010-en
General
-
Target
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
-
Size
61KB
-
MD5
d0eb853b69cbcc4757456263156bc1bb
-
SHA1
a44d4894b5cfe87d99e51e8ce72b825a1aa5416f
-
SHA256
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294
-
SHA512
c0ae41557d1af1ca13e70deb8443c706697200fb6f22b74411fa4dd967f4de07e222b39daa8ac39bd603e888046979a0c9bdef76649d724313879f91dd81f5d6
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5/:FdseIOMEZEyFjEOFqTiQmTl/5/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1740 omsecor.exe 2328 omsecor.exe 2948 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1996 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 1996 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 1740 omsecor.exe 1740 omsecor.exe 2328 omsecor.exe 2328 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1740 1996 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 1996 wrote to memory of 1740 1996 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 1996 wrote to memory of 1740 1996 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 1996 wrote to memory of 1740 1996 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 1740 wrote to memory of 2328 1740 omsecor.exe 33 PID 1740 wrote to memory of 2328 1740 omsecor.exe 33 PID 1740 wrote to memory of 2328 1740 omsecor.exe 33 PID 1740 wrote to memory of 2328 1740 omsecor.exe 33 PID 2328 wrote to memory of 2948 2328 omsecor.exe 34 PID 2328 wrote to memory of 2948 2328 omsecor.exe 34 PID 2328 wrote to memory of 2948 2328 omsecor.exe 34 PID 2328 wrote to memory of 2948 2328 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5114f04a76fdf1790cc0dcf292208f93b
SHA1da241e00c7012357d2f22275aeae36dcb6e381b9
SHA256353c9bfd920a7dda81a14888b00b4ef38829d7e03545bc509377d7c37382f3e3
SHA512a952ec18d3cb534af274c71de72871b3494c8237a5fbffe5a3a847373866620547c016a282530bcc6d4cb1fd14f6e25df5abb2468512319f7b78fb9357ece700
-
Filesize
61KB
MD521b95e12c26e9d3d686ad8ff933f548f
SHA1244d74b3e7fa3bbe0bb1afa63b364908a82f573b
SHA256e2c943ec1c07999bac530d75da3e7827340eca79c6f5766bfecc8944bfc51dea
SHA512a1932fc86779770b208bbfff2d300d799f779e7f29266062deca7d7790eb6abda32092d99b637fe255af4295a549440799b162f3b53ad1e7eafa5ee99f931ece
-
Filesize
61KB
MD58417641b7f7031905cc881c0b562cbba
SHA19ed457046f59e5176593ec963d02ab6f682c625b
SHA256fcf92b3456c2703e7a045e7c2659ceff6b7cd5052070b53c0d5a7399fd24bc2d
SHA512e2c5f7c18094449ebc5e42f3fc5b230c65afac11963a954b32af40a7eee7b4be83257d12d1c476493401aea0036c7804bd19f928b7db23dc185bfcf68ec83fe0