Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 11:24
Behavioral task
behavioral1
Sample
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
Resource
win7-20240708-en
General
-
Target
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
-
Size
61KB
-
MD5
d0eb853b69cbcc4757456263156bc1bb
-
SHA1
a44d4894b5cfe87d99e51e8ce72b825a1aa5416f
-
SHA256
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294
-
SHA512
c0ae41557d1af1ca13e70deb8443c706697200fb6f22b74411fa4dd967f4de07e222b39daa8ac39bd603e888046979a0c9bdef76649d724313879f91dd81f5d6
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5/:FdseIOMEZEyFjEOFqTiQmTl/5/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1976 omsecor.exe 2004 omsecor.exe 1596 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2052 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 2052 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 1976 omsecor.exe 1976 omsecor.exe 2004 omsecor.exe 2004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2052 wrote to memory of 1976 2052 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 2052 wrote to memory of 1976 2052 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 2052 wrote to memory of 1976 2052 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 2052 wrote to memory of 1976 2052 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 30 PID 1976 wrote to memory of 2004 1976 omsecor.exe 33 PID 1976 wrote to memory of 2004 1976 omsecor.exe 33 PID 1976 wrote to memory of 2004 1976 omsecor.exe 33 PID 1976 wrote to memory of 2004 1976 omsecor.exe 33 PID 2004 wrote to memory of 1596 2004 omsecor.exe 34 PID 2004 wrote to memory of 1596 2004 omsecor.exe 34 PID 2004 wrote to memory of 1596 2004 omsecor.exe 34 PID 2004 wrote to memory of 1596 2004 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5114f04a76fdf1790cc0dcf292208f93b
SHA1da241e00c7012357d2f22275aeae36dcb6e381b9
SHA256353c9bfd920a7dda81a14888b00b4ef38829d7e03545bc509377d7c37382f3e3
SHA512a952ec18d3cb534af274c71de72871b3494c8237a5fbffe5a3a847373866620547c016a282530bcc6d4cb1fd14f6e25df5abb2468512319f7b78fb9357ece700
-
Filesize
61KB
MD50e0320a6931f6136462f82826d099fc5
SHA1dcee3987799d7b5f7e8ba67bea14b80dab94146e
SHA25695e03047a09b0bbf56a58cb83be11cfe03b6f5ce229852895bb134e299887840
SHA512295c059d56163e3679635bdab2e11199c7529a881b8e72c00cbc32edcf5193848f96b23a56045ba750674e2e6098a1592e2615dd98ebdca91da3f997648d8159
-
Filesize
61KB
MD5f944c30968c43bf62137cbcdb45a32be
SHA11f8cb600e06daa0c0ce20ee80b9d0d1f8997b74e
SHA25606f3a7f8c00ec31c51c0848619c815911da6b372f913a48e350c41ab32c43102
SHA5129d2a2680100f4860952d87a141e47662e461dbf811f7a5e1f8708ef2bd933aaf18ce2c85d003e016135b3dc5e1af4c1e41a37d58899f106693b5c37799305b8c