Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 18:38
Behavioral task
behavioral1
Sample
1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe
Resource
win7-20240903-en
General
-
Target
1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe
-
Size
62KB
-
MD5
3dcdb2d1d4ba8dfb3a9d6fe0b1b20e75
-
SHA1
bd322d374d7ec59ce7994fefb808ab42e51ea521
-
SHA256
1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9
-
SHA512
5130d0939b8336d13173c97dd6720cc61d27d24ec5afc73fcb274c180843534052e09d30e4672753f8a8687fbde935ced8f6a961103bc4b6dd32c357aa673f93
-
SSDEEP
768:sMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uA9:sbIvYvZEyFKF6N4yS+AQmZtl/5l
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2932 omsecor.exe 1568 omsecor.exe 532 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2316 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 2316 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 2932 omsecor.exe 2932 omsecor.exe 1568 omsecor.exe 1568 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2932 2316 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 31 PID 2316 wrote to memory of 2932 2316 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 31 PID 2316 wrote to memory of 2932 2316 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 31 PID 2316 wrote to memory of 2932 2316 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 31 PID 2932 wrote to memory of 1568 2932 omsecor.exe 34 PID 2932 wrote to memory of 1568 2932 omsecor.exe 34 PID 2932 wrote to memory of 1568 2932 omsecor.exe 34 PID 2932 wrote to memory of 1568 2932 omsecor.exe 34 PID 1568 wrote to memory of 532 1568 omsecor.exe 35 PID 1568 wrote to memory of 532 1568 omsecor.exe 35 PID 1568 wrote to memory of 532 1568 omsecor.exe 35 PID 1568 wrote to memory of 532 1568 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe"C:\Users\Admin\AppData\Local\Temp\1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD54b9c29f26ead3b6be3c2066dc511476d
SHA1a1cee8ddfaeeb934bc2c2ce6c2a268ca5254955b
SHA25602716db5021493b91fc436ae05ec3cbbba7586b646bcb6fc1b653b39efcaa7f8
SHA5120d2aa4950d09450ffaff88edbba451e41dd177205ffdca787bd5197fa47db2cd5706dc2901526642bd3cdc9ac99d5c60abf6bea0e5a583da91bbbdf88513002c
-
Filesize
62KB
MD5325e814de1e57ea2a120db75cb05790e
SHA17819d2069f6442ab78c04ee3f462320545588086
SHA256acf7ca34ac474490b2467c3c24118785ffde6f72a150a5c23cd54bcb880925f8
SHA51211dfa9359bf08a206e20e6274b485af4f846a8893c127fe2a2a3779021ff7373649562af53ec30dd2b124bc52c205840736520cb6b5378b2309d14e24a930735
-
Filesize
62KB
MD55abae3f59312361035f71cd49484e7a2
SHA1f07db8c52e6045d99d119499d9ff39e7fcf068e5
SHA25651c58f2c1e3900d6517ba2f47ed70125c70bff9870f74c8d8b01fbdc509ae071
SHA512940def11a3fef8a31287e590d2eeb7ed52bf5c06533a8918e16150e9435602b004e13137bc02e2aca3729adf7716a297dfddbd2cd6c1de7cffc96be8d4f94e66