Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 01:18
Behavioral task
behavioral1
Sample
d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe
Resource
win7-20240708-en
General
-
Target
d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe
-
Size
92KB
-
MD5
cf4f8fb094141a9382ef9bfab04abc0c
-
SHA1
581a9207f9eba54afedb9ce6b40932a4b7d31e82
-
SHA256
d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557
-
SHA512
d27fc40a261b115a568c448f7cf2ad316b543b3d18309e13133c196babfdedb72a6ebfd8dfd74e7dd2e2abe8c831388b7426d3d26f994ccc2943de1c9be66352
-
SSDEEP
1536:qd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5:qdseIOyEZEyFjEOFqTiQm5l/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2980 omsecor.exe 276 omsecor.exe 2032 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2360 d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe 2360 d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe 2980 omsecor.exe 2980 omsecor.exe 276 omsecor.exe 276 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2980 2360 d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe 31 PID 2360 wrote to memory of 2980 2360 d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe 31 PID 2360 wrote to memory of 2980 2360 d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe 31 PID 2360 wrote to memory of 2980 2360 d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe 31 PID 2980 wrote to memory of 276 2980 omsecor.exe 33 PID 2980 wrote to memory of 276 2980 omsecor.exe 33 PID 2980 wrote to memory of 276 2980 omsecor.exe 33 PID 2980 wrote to memory of 276 2980 omsecor.exe 33 PID 276 wrote to memory of 2032 276 omsecor.exe 34 PID 276 wrote to memory of 2032 276 omsecor.exe 34 PID 276 wrote to memory of 2032 276 omsecor.exe 34 PID 276 wrote to memory of 2032 276 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe"C:\Users\Admin\AppData\Local\Temp\d3023ceefccb82c10785cc0c110cfeb0542b87c80c7bcc60adda7b27c479f557.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5804365f912e21e62ecb98d4a2791dc72
SHA1405b39dbaf8331f41fabd2904d5f3fac1da1ce36
SHA2567dc3a6199dddccd26981046b401b97b2bdbdbbc199c0cc41d0c90330020a72cb
SHA512f2ddbb939a5c5b0a8e9ecf1f35c953938e3203908b435cccf6df787c11d1dc7925fb003033b33fdd2b37fd610b460251a0d63296e83c5bf2559f60ef328617d2
-
Filesize
92KB
MD5cefa1f433c348996d8b6b1099700ce0b
SHA1eb3da9b3054394713d79c72729979d4a7937cc3e
SHA2562b1e6e57fe077b80c858d38346a09d76d8f2034fdc3d69baf79bffae6db807c4
SHA5120f0252c3c3e203aea0c43b36ed9dee5ff825008c38a410879f0d9fc0f0077be9dedc50e83e563f7810aaff35eb9a2235d88ff587ab99cdf6a8c471880ae0c2e7
-
Filesize
92KB
MD5f69a0dc08c79b4729ead3fa41f2686f6
SHA1fc5ba6c42df0688ce25329eebd3f887dc50df923
SHA25651196822ba1c53bd3d4a95061512711e9e0c3f9da0a073a3c15f3dbd7e34faf1
SHA512fddb7406cb36a4d991a37639a3acd561a2e7a32f178e613c75dd3abf874ec447f5f169463b5a470d63a30fbefff75b0ee2f8078f36541da0e633cca1041420f1