Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 14:13
Behavioral task
behavioral1
Sample
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
Resource
win7-20240903-en
General
-
Target
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
-
Size
61KB
-
MD5
f8078bfc32acd72e6a1dd0792addff28
-
SHA1
76201c74a5273413c26c717faef17e8495a34b44
-
SHA256
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38
-
SHA512
e2bae942352907b158b1a0b4605d5621b17666ef0c8b5ce8bd90cfe583c229d90dd5c1bed8dbb07a52f018a53b92514768b499f97429f303ed0a679d2e1b1517
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5P:LdseIOMEZEyFjEOFqTiQmFql/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2972 omsecor.exe 536 omsecor.exe 2848 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2208 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 2208 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 2972 omsecor.exe 2972 omsecor.exe 536 omsecor.exe 536 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2972 2208 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 31 PID 2208 wrote to memory of 2972 2208 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 31 PID 2208 wrote to memory of 2972 2208 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 31 PID 2208 wrote to memory of 2972 2208 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 31 PID 2972 wrote to memory of 536 2972 omsecor.exe 34 PID 2972 wrote to memory of 536 2972 omsecor.exe 34 PID 2972 wrote to memory of 536 2972 omsecor.exe 34 PID 2972 wrote to memory of 536 2972 omsecor.exe 34 PID 536 wrote to memory of 2848 536 omsecor.exe 35 PID 536 wrote to memory of 2848 536 omsecor.exe 35 PID 536 wrote to memory of 2848 536 omsecor.exe 35 PID 536 wrote to memory of 2848 536 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD50a4c4e946602c24bb4e6e3e24b6faf52
SHA16d36a7f7ef071bf64aa54b95746eeecc659c4a99
SHA256035b09e844bc78016a34f0788275d21144175fd144ebf84b140643139fe59416
SHA5128acd6e9fcdc69390e9fcb8ddd5ec6d9902b90d63d072cf98c66a3a7054c79f5b5cee31a517472e827d263d6a1feb2687fdfb3bbb2f7f3616d06f0ab70de6b450
-
Filesize
61KB
MD549a8fba731782e7a9be1411103df3d6d
SHA193a635b6c0a18eb29ccc0bb5ec9f07bde5691183
SHA2566269961744b12aed63190d88e606b53dddca6d5aa907af37139f2e5567956fb0
SHA5125d45c4ef6c17f2bde8fb9e487a6dc9b9a8d3f87cbaadc46bb9360d01a4a637f2624b7be2c46cf67968098ad95e7d35123283a19c352a6008bb69e86719219907
-
Filesize
61KB
MD58e7b4dde56ca62bd4fff4fdf8868eb77
SHA1375399725fb7e5ac5188664a568107fbc580e151
SHA256fd3b7d4c94b7c99f242fb42c2355ae6d59fb55880de601c876293f0aa2e86641
SHA512bd23b5d18907ec8e5bf638698b109bff6afb7385886bfb88bf6b72589128252a634ff5350810e0f5bf8918b108d8bcbfa761a3023e18a0bfcd4df0da84039dad