Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 21:34
Behavioral task
behavioral1
Sample
3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe
Resource
win7-20240903-en
General
-
Target
3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe
-
Size
80KB
-
MD5
a6a4d61642344f69842308d7d0b50104
-
SHA1
1048ed9463d5cb12a871b47eb01a269915ac2e2b
-
SHA256
3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca
-
SHA512
0d7c9a7e7410cc795929dfd3473a3b45a9bafb4a9ab311720f9d6aca1b62280fa07a721e9fae4659412a2ae8e678ad47f6dd3a96091daf57ee8c8b0f0d86008a
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:TdseIOMEZEyFjEOFqTiQmOl/5xPvwX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3020 omsecor.exe 1984 omsecor.exe 2840 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2932 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe 2932 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe 3020 omsecor.exe 3020 omsecor.exe 1984 omsecor.exe 1984 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3020 2932 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe 30 PID 2932 wrote to memory of 3020 2932 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe 30 PID 2932 wrote to memory of 3020 2932 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe 30 PID 2932 wrote to memory of 3020 2932 3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe 30 PID 3020 wrote to memory of 1984 3020 omsecor.exe 33 PID 3020 wrote to memory of 1984 3020 omsecor.exe 33 PID 3020 wrote to memory of 1984 3020 omsecor.exe 33 PID 3020 wrote to memory of 1984 3020 omsecor.exe 33 PID 1984 wrote to memory of 2840 1984 omsecor.exe 34 PID 1984 wrote to memory of 2840 1984 omsecor.exe 34 PID 1984 wrote to memory of 2840 1984 omsecor.exe 34 PID 1984 wrote to memory of 2840 1984 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe"C:\Users\Admin\AppData\Local\Temp\3c6921867c1a38631ae82a64e0167f454cf67aee61427605f06c0be0a42e6eca.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD523e42895f0db5c89981ac2edf831e744
SHA15375a785af0a2a942afc562e62eb14c2c7166ded
SHA256f8d89a95f7040300401ce5d1a7d297e7ba713d4a9af7fc163a9ddece95d14e4c
SHA512661a0cab5c9b48f1db82b8c21fad8904fd2e9b3cd5955e384d8f4693ea9305d7adef424caa9c5ccda606b25a8232f63ced2fb465232f8a0900464f92cd0efb9f
-
Filesize
80KB
MD5a07d5d2b4972553d498c2d3fbdd97979
SHA1949fef7d9c4aa941f675f19ecadcdd24196a5a68
SHA256c067f0103d5876b99942a80021979ae33edcee22c4b30a0c8deeb6bb20e09d61
SHA51275ae0b20b4635299f72a9f3aac0dc01a8b1a0f0d3b1e5f395a3c1e7b260f3d9fe87e13e2a33c2593f5cc50a2091b70f506f9e5854a5de28cb9337b6885b87304
-
Filesize
80KB
MD5f13ebe3915bf0b38cb8179c37ed378be
SHA14a36ff024720bc1dbb080881aff9a7beb0c63902
SHA2561cea42715d3cbb14fff4256591753dea8f727b7b57d7ca320b43dc2d21febf96
SHA5122f7697d5554015d4149a80a153259eec8e13624bebbdf440809b0e23e51ae1aaba66f5b4ab6256683acb5d348f903f0f6b49bae2f4947c6f8ab77bed79ac2347