Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 00:17
Behavioral task
behavioral1
Sample
a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe
Resource
win7-20240708-en
General
-
Target
a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe
-
Size
90KB
-
MD5
e70979f2cb5eb8e7e410b87a94f5af0b
-
SHA1
51669cacbd1c41b01b99e4bd68f4df34f3747ffe
-
SHA256
a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9
-
SHA512
3dd587df70334707211afe5a5038893971f656ced03a0853366c167c82528522b922a0dd9918df5648f885698ba97efc0e045f39a11883b4f94d0f160a1b17a8
-
SSDEEP
768:+MEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:+bIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3040 omsecor.exe 1744 omsecor.exe 1176 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2984 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 2984 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 3040 omsecor.exe 3040 omsecor.exe 1744 omsecor.exe 1744 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3040 2984 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 30 PID 2984 wrote to memory of 3040 2984 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 30 PID 2984 wrote to memory of 3040 2984 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 30 PID 2984 wrote to memory of 3040 2984 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 30 PID 3040 wrote to memory of 1744 3040 omsecor.exe 33 PID 3040 wrote to memory of 1744 3040 omsecor.exe 33 PID 3040 wrote to memory of 1744 3040 omsecor.exe 33 PID 3040 wrote to memory of 1744 3040 omsecor.exe 33 PID 1744 wrote to memory of 1176 1744 omsecor.exe 34 PID 1744 wrote to memory of 1176 1744 omsecor.exe 34 PID 1744 wrote to memory of 1176 1744 omsecor.exe 34 PID 1744 wrote to memory of 1176 1744 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe"C:\Users\Admin\AppData\Local\Temp\a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5e7d9f64a32cea5f699a2f92e029e259b
SHA12a19a9b580167988eab0eaeea25f69c3f7c2fd9f
SHA256c93385637ac2e36361be2dcbf8bba832d3b60cf2d45a6fa3e1a3a3ea77897a12
SHA512aa078325c751d07d9caef3e2fcc613bae018f3aef14b15d99ee6a07130e03d6f188fee1400ddd98607c5dd0783823252a2db790971d59ddd8b2c8d708ab5ff8c
-
Filesize
90KB
MD52615d6336004befc9213c3dbcaabc999
SHA1f2d993ab31acfaaeb730010c8fa6bda3be813b55
SHA2561a1d5e26fb0e180d278e9b3a1f43bb0ba478e0e24a32aa6c38c2b47c46be9a1e
SHA512e31ea76b7733c4c8cfb46428ac72035d8cf33661f5fd29b96633f98cfc2599c95cf96ad21bd3fa63a8bfbdd4ac3db61033a822aa2f880a3532014e10a3479516
-
Filesize
90KB
MD5fbd8aa7ccdf36972fd8bec9c656717ae
SHA106b06b75bd0208116a80069710f5b7cbf999a3b4
SHA25693c23bbbc2050417d1ca8c483bd30426b8dee6a5db36c5a1dd437b52a4d5c857
SHA512458b779ebb715e47bf3b9a1d048dd96c45d1d574653950d487f1a6bee66b0b5474e8860d57042e6c7d26a2dc3bafed7e48799a1beb332d23d30ec738a18c40ba