Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 14:09
Behavioral task
behavioral1
Sample
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
Resource
win7-20240903-en
General
-
Target
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
-
Size
61KB
-
MD5
f8078bfc32acd72e6a1dd0792addff28
-
SHA1
76201c74a5273413c26c717faef17e8495a34b44
-
SHA256
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38
-
SHA512
e2bae942352907b158b1a0b4605d5621b17666ef0c8b5ce8bd90cfe583c229d90dd5c1bed8dbb07a52f018a53b92514768b499f97429f303ed0a679d2e1b1517
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5P:LdseIOMEZEyFjEOFqTiQmFql/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2516 omsecor.exe 1972 omsecor.exe 1108 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1240 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 1240 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 2516 omsecor.exe 2516 omsecor.exe 1972 omsecor.exe 1972 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2516 1240 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 30 PID 1240 wrote to memory of 2516 1240 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 30 PID 1240 wrote to memory of 2516 1240 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 30 PID 1240 wrote to memory of 2516 1240 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 30 PID 2516 wrote to memory of 1972 2516 omsecor.exe 33 PID 2516 wrote to memory of 1972 2516 omsecor.exe 33 PID 2516 wrote to memory of 1972 2516 omsecor.exe 33 PID 2516 wrote to memory of 1972 2516 omsecor.exe 33 PID 1972 wrote to memory of 1108 1972 omsecor.exe 34 PID 1972 wrote to memory of 1108 1972 omsecor.exe 34 PID 1972 wrote to memory of 1108 1972 omsecor.exe 34 PID 1972 wrote to memory of 1108 1972 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD50a4c4e946602c24bb4e6e3e24b6faf52
SHA16d36a7f7ef071bf64aa54b95746eeecc659c4a99
SHA256035b09e844bc78016a34f0788275d21144175fd144ebf84b140643139fe59416
SHA5128acd6e9fcdc69390e9fcb8ddd5ec6d9902b90d63d072cf98c66a3a7054c79f5b5cee31a517472e827d263d6a1feb2687fdfb3bbb2f7f3616d06f0ab70de6b450
-
Filesize
61KB
MD587a021653ff21a6491cf1de934c9ecef
SHA18561067c60798e345f9bbb0010d216830c42c471
SHA256576efe7589935cd1a0762b60f4e87b9aea71bf1f58fb5f99cf5756f121e91593
SHA512dfbb7014f5cf4117363e3af1594686db868e20e95d286d5c30ada7d1c6dae10ca28ae152b33c27c28240c219f163722ccdb3f211e69984ac375544df0bc4a1c5
-
Filesize
61KB
MD535a4a085355968f684cd54478fc37c68
SHA1e193bebc4c8ff673a9c9e6cbee81d8a896b7fa5a
SHA2569ac765e9ac394388c98673496facbfffcb449b008d331968a36d5c792d7bab67
SHA5123a3b1c6b608f6aaeacbf964dc00719f0c281e2e8a6ed58fa4feb12cc25c26926e4ec1ff1ecf9104b3baf402aba9c9771de2de99ba87ad6f4cb6601d528a4899b