Analysis
-
max time kernel
111s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 21:35
Behavioral task
behavioral1
Sample
497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe
Resource
win7-20240903-en
General
-
Target
497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe
-
Size
35KB
-
MD5
aa613a8bd25bc214a676cac7f0abedff
-
SHA1
6bf050d95858ae02be396e8edf26087510d8d5f7
-
SHA256
497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54
-
SHA512
502873de7479dfc73e92076ec09299f3dfaad4f3e1fed373e85683c4bcdf0c78acd47ab3784a8e525b68cb5c2ec1c0f554ec202fa01436ed396f5746485ed517
-
SSDEEP
768:K6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpBn:J8Z0kA7FHlO2OwOTUtKjpBn
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1696 omsecor.exe 2948 omsecor.exe 1976 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1992 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 1992 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 1696 omsecor.exe 1696 omsecor.exe 2948 omsecor.exe 2948 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
resource yara_rule behavioral1/memory/1992-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x00080000000120f9-2.dat upx behavioral1/memory/1696-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1992-9-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1696-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1696-17-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1696-20-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1696-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x00080000000164de-26.dat upx behavioral1/memory/1696-27-0x0000000002000000-0x000000000202D000-memory.dmp upx behavioral1/memory/1696-35-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x00080000000120f9-38.dat upx behavioral1/memory/1976-47-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/2948-45-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1976-49-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1696 1992 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 30 PID 1992 wrote to memory of 1696 1992 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 30 PID 1992 wrote to memory of 1696 1992 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 30 PID 1992 wrote to memory of 1696 1992 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 30 PID 1696 wrote to memory of 2948 1696 omsecor.exe 33 PID 1696 wrote to memory of 2948 1696 omsecor.exe 33 PID 1696 wrote to memory of 2948 1696 omsecor.exe 33 PID 1696 wrote to memory of 2948 1696 omsecor.exe 33 PID 2948 wrote to memory of 1976 2948 omsecor.exe 34 PID 2948 wrote to memory of 1976 2948 omsecor.exe 34 PID 2948 wrote to memory of 1976 2948 omsecor.exe 34 PID 2948 wrote to memory of 1976 2948 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe"C:\Users\Admin\AppData\Local\Temp\497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5a2a8b433f154ec907b871802954cdf9d
SHA1711eb454c28ef70d18f21209a32adb6d24c526d1
SHA256b88e1f8df529f7d06247de2d5cfe6cc8b09ac4994cc5fe35426f4bd91a47bd2c
SHA51289ceb115c95a0602c2b2da54555110bce7f238a07021833a21e1325b42e86f0d356453d7e7dedf998c003e7b11375b9bd165fb419cdae295fbb7440c370b8bd8
-
Filesize
35KB
MD5c8f2fa3cdc340c6e0458a441e0aa190d
SHA1d8daf4f255f65b4d0ba0f0363cb32eded4e893a3
SHA2566d793502bba3d6a850fe76e98e7804eded22e691c81d855a5022cbe72d009703
SHA51298ffb74851fd145246dfa3e72e61d9a23a64ff03898a9702d5f355c9b553de55ca16dc0cb16fc9bfcab68848d559f7d61b49b493097f87e0abb49e5bf5835cf0
-
Filesize
35KB
MD56a5186b308e192df1394f97e185050ee
SHA1ba67db9bb36fd0d16bfa69d9cca55c01c5ad3e6b
SHA25651506ae78ab350b31077650f75f274d010bd47de9dcd5421b8830417b5b24169
SHA512b4a32da1ec4fdce3b2e257ead17082c0a7d0abb244a8a20dd53248c3b7ecd6782f37db078f99aeb4fb4d9954a4fda658e5ce04ebe13469faf138c16e5324a483