Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 16:29
Behavioral task
behavioral1
Sample
2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe
Resource
win7-20240903-en
General
-
Target
2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe
-
Size
62KB
-
MD5
13058928627ee64bcf607d67cb75f148
-
SHA1
8355da69de99e0c9716981fba0826f4cd0b61803
-
SHA256
2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377
-
SHA512
af3d91fdbc5244fd8cc5c9386de32236bfd56ed2be312de8cbfdc3a0eb2762525c9542108b202583604fc9bf706c8114f10719e8aebc763c30eeedfb9f4037c1
-
SSDEEP
768:oMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uAF:obIvYvZEyFKF6N4yS+AQmZtl/5N
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2156 omsecor.exe 1608 omsecor.exe 2792 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1880 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe 1880 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe 2156 omsecor.exe 2156 omsecor.exe 1608 omsecor.exe 1608 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2156 1880 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe 30 PID 1880 wrote to memory of 2156 1880 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe 30 PID 1880 wrote to memory of 2156 1880 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe 30 PID 1880 wrote to memory of 2156 1880 2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe 30 PID 2156 wrote to memory of 1608 2156 omsecor.exe 33 PID 2156 wrote to memory of 1608 2156 omsecor.exe 33 PID 2156 wrote to memory of 1608 2156 omsecor.exe 33 PID 2156 wrote to memory of 1608 2156 omsecor.exe 33 PID 1608 wrote to memory of 2792 1608 omsecor.exe 34 PID 1608 wrote to memory of 2792 1608 omsecor.exe 34 PID 1608 wrote to memory of 2792 1608 omsecor.exe 34 PID 1608 wrote to memory of 2792 1608 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe"C:\Users\Admin\AppData\Local\Temp\2029d4e150d9c92627f57e5a8b76410fb05a3586b89c0d71bc4500f37a66d377.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD54d806911ce56b7bcdff20ce18b65da04
SHA1e6020328055fa12e13511efcd08736cfddb23032
SHA256705c44302f74daba504611d347fabfe9e6718b7946e5996cb7c0677241a2208c
SHA51289ccc997248a1f1008a67b5d1d33fd72b95247795139aa3cc73b90114c8dc12539a0e61b7e84443bbca35f35d2ed7e429509e938bbdda8b283014d06485f681d
-
Filesize
62KB
MD5d6ed78621e78bc722a52a29907aff122
SHA1a49c840ba3fb54bd5403f9e5e440f67e34ebd2af
SHA256698a3c621ced5b6722fc8fad5083e78e52dc2bd08072f4cdadc6d19ef34ffd92
SHA512e773a9870fa0e7c6f39fd62b23c9d9d2d1c3254182f8bdb8330858fafacd930b00dfe6e624691700fd6f52e257de2ea56a70f55bca6a068dedc027003e61ffa8
-
Filesize
62KB
MD5276478e5b16f941ed2ae5cc8b44cb8db
SHA10474e3924206a173e35e71b81fae675876cf873d
SHA256ba8c9ac53a1b7fdf6ae1dd656ad4d48578a4e03de74dc3ea4b42625f70aec575
SHA512559b291c066d2c6d2d4352e3a1a273c6657df5e9acc950342568649b3983a73ee47c2bc610d3fc45ebc80ca1c662220fa01955e3271446b68a56582c88afccc2