Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:59
Behavioral task
behavioral1
Sample
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe
Resource
win7-20240903-en
General
-
Target
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe
-
Size
64KB
-
MD5
73e5f0f01bf8368b8b82432b027610e5
-
SHA1
ecf068b47a2747e0ef0286c6f9d03f2f8aacfaa7
-
SHA256
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f
-
SHA512
46d0172face375c9f10315a571080a1d6af155e4b7209eafb8caf5b90e9761219afeffa54eff935b5d915b009bfbfefe65bd4ee0c7f8207c21291d74f0726791
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:NbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2708 omsecor.exe 1632 omsecor.exe 2916 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1152 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 1152 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 2708 omsecor.exe 2708 omsecor.exe 1632 omsecor.exe 1632 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2708 1152 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 1152 wrote to memory of 2708 1152 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 1152 wrote to memory of 2708 1152 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 1152 wrote to memory of 2708 1152 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 2708 wrote to memory of 1632 2708 omsecor.exe 33 PID 2708 wrote to memory of 1632 2708 omsecor.exe 33 PID 2708 wrote to memory of 1632 2708 omsecor.exe 33 PID 2708 wrote to memory of 1632 2708 omsecor.exe 33 PID 1632 wrote to memory of 2916 1632 omsecor.exe 34 PID 1632 wrote to memory of 2916 1632 omsecor.exe 34 PID 1632 wrote to memory of 2916 1632 omsecor.exe 34 PID 1632 wrote to memory of 2916 1632 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe"C:\Users\Admin\AppData\Local\Temp\7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59cb842ffda5cc91a433fd8c8655c0678
SHA19a94a3a65ade88a164e0d7ed451d26b7af41f6fb
SHA25699c4637bfd77d17ec3a9d8a7d95c65c8045720a083f6741776aa8147acf89c99
SHA512d24054996135b838e73c795a5fbdc1054d985e56e7c9743501d8f46af071292c98aef444733bbd07f9b08613fd92b3459453b0d648b0c037d94347f7d9075409
-
Filesize
64KB
MD502247659bf3e35dda240cd725720fe2e
SHA18e9a028dea408fbde4db409743d8c09de8451a7e
SHA25630c7bd8267b668e098daaf2ebd9cf9432e944330ee3494c62f9f007cafc0fbfc
SHA512d8dd2110c509be5a6f5b71b03249d9dfc9b536714c7ae5a48b354fa08fed1a8596c22aab9e47247e63d112a7bce49cde64199ee8812ca0c81b8f409b330ff4bd
-
Filesize
64KB
MD54eecf3f631748d7d1192b450a4fd55fc
SHA12b33c5f93cd4a86d8a2ff4f5f3d5e1fce6e43ce7
SHA256f9f40179327a47aab79226e9fd139b8b727f9c61634f61ada836c84da2a425b4
SHA51296ebbe8d3936135a24809e89ac05d02d296388fde3ac698fcbbe4539918fb7a1175bd5a232592f18e364320aa10259c8c0875586d6a2d9e6415f234f94a91dbc