Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:57
Behavioral task
behavioral1
Sample
622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe
Resource
win7-20240708-en
General
-
Target
622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe
-
Size
80KB
-
MD5
7ff47073999fa2bf7d182d25da9848d0
-
SHA1
c59e6d35e595dc21ce46845f1b34b39416cc6c22
-
SHA256
622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a
-
SHA512
3cc4a35afcd1e5d7310cc7186e01c68baf3478ec1a1d92a1b68adb5089affe6f54eada4486ea53fc1466361d6efd2845e91f253a6db7654a5551718f010970eb
-
SSDEEP
768:nfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAe:nfbIvYvZEyFKF6N4yS+AQmZTl/5W
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2460 omsecor.exe 2212 omsecor.exe 2580 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1504 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe 1504 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe 2460 omsecor.exe 2460 omsecor.exe 2212 omsecor.exe 2212 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2460 1504 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe 30 PID 1504 wrote to memory of 2460 1504 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe 30 PID 1504 wrote to memory of 2460 1504 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe 30 PID 1504 wrote to memory of 2460 1504 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe 30 PID 2460 wrote to memory of 2212 2460 omsecor.exe 32 PID 2460 wrote to memory of 2212 2460 omsecor.exe 32 PID 2460 wrote to memory of 2212 2460 omsecor.exe 32 PID 2460 wrote to memory of 2212 2460 omsecor.exe 32 PID 2212 wrote to memory of 2580 2212 omsecor.exe 33 PID 2212 wrote to memory of 2580 2212 omsecor.exe 33 PID 2212 wrote to memory of 2580 2212 omsecor.exe 33 PID 2212 wrote to memory of 2580 2212 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe"C:\Users\Admin\AppData\Local\Temp\622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f2ea4f51b5256588615438c81c085353
SHA1debfc847bf17854b35243d3f025a585916a5b193
SHA256d7a48273ce9d8b77ef72402e204c26115fa003412ef6d6679cd73d1b48f3ad5c
SHA51237690d1750ef5a88a66721f371f3c134776f973261c2e5702c8ed239ec2f2eb22e0e85d7e7abdb54b2d2080e3921d3d36b6dbb309e2f42fd600eb3e67510deb6
-
Filesize
80KB
MD5686e55a4581c64469062a6ca1d3a25ee
SHA119d15af3134d14a044f175e051ccbcecb35f05d8
SHA2560d843fdc5ba232606f22dbe2b33a2174f3d6db027e951daa5511bf9983ed7a5f
SHA512d7ed15d80cf8ddf379e27d1a3a9ff10168b1e80d49656d6de0426b14fea13ec4d2815aa1008fa0cb16fb9cb48a09159e4176607713e9ce10254bc4020a3d7771
-
Filesize
80KB
MD579f708f0cab44c3327d191ddbedd48a7
SHA1bc02c4d052f73c20cf3644884e078bb16bdab0a9
SHA25690fba9afcb54053e88ee48c2a3ddb1284b97f79dd60c9dc3a38a9dbc9054056e
SHA512702e27db91370dc3c2bc00273e7efa10143954b438f3a22250accfe520087fbe4b9a898330077fdebe54672be6e8e36415353b8987d661032cb713e753e717d6