Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 17:15
Behavioral task
behavioral1
Sample
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe
Resource
win7-20240729-en
General
-
Target
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe
-
Size
64KB
-
MD5
73e5f0f01bf8368b8b82432b027610e5
-
SHA1
ecf068b47a2747e0ef0286c6f9d03f2f8aacfaa7
-
SHA256
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f
-
SHA512
46d0172face375c9f10315a571080a1d6af155e4b7209eafb8caf5b90e9761219afeffa54eff935b5d915b009bfbfefe65bd4ee0c7f8207c21291d74f0726791
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:NbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2544 omsecor.exe 816 omsecor.exe 1072 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2536 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 2536 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 2544 omsecor.exe 2544 omsecor.exe 816 omsecor.exe 816 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2544 2536 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 2536 wrote to memory of 2544 2536 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 2536 wrote to memory of 2544 2536 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 2536 wrote to memory of 2544 2536 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 31 PID 2544 wrote to memory of 816 2544 omsecor.exe 33 PID 2544 wrote to memory of 816 2544 omsecor.exe 33 PID 2544 wrote to memory of 816 2544 omsecor.exe 33 PID 2544 wrote to memory of 816 2544 omsecor.exe 33 PID 816 wrote to memory of 1072 816 omsecor.exe 34 PID 816 wrote to memory of 1072 816 omsecor.exe 34 PID 816 wrote to memory of 1072 816 omsecor.exe 34 PID 816 wrote to memory of 1072 816 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe"C:\Users\Admin\AppData\Local\Temp\7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD51ed2634a1101a7e9e7d231888fbab04f
SHA1247ea5a342c56b24748e914e9e55d14a3278238f
SHA256d15d3013194c2bdb53b1410b82f43e7d40298154cffada5029c8f16aebca4482
SHA512222fcd1815d5b45b2634037ab7ff09dd4db7f015ca31688dac8f29a44230fed40d10a09448b6ee10403ec5cfc8d041361d2e614eb15a64b5346c14f7090b415d
-
Filesize
64KB
MD59cb842ffda5cc91a433fd8c8655c0678
SHA19a94a3a65ade88a164e0d7ed451d26b7af41f6fb
SHA25699c4637bfd77d17ec3a9d8a7d95c65c8045720a083f6741776aa8147acf89c99
SHA512d24054996135b838e73c795a5fbdc1054d985e56e7c9743501d8f46af071292c98aef444733bbd07f9b08613fd92b3459453b0d648b0c037d94347f7d9075409
-
Filesize
64KB
MD52fe3cf74c77be75e4c6447c0838fc8b1
SHA15b8cf602aa4ea28cb03a384a1056a051de82538e
SHA256fa36f920c11d69ade40aa10a0fd309d8f052b4869f3d9eb9b56d6575fc3fc553
SHA512604a7c4330f414da5bea784c67d41616939a221b2bee0b9b21768b80bd898c0535861c030741da1a33458cf757870a1cef2240d6f54856f97b3e7f6b1c6534ae