Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 09:19
Behavioral task
behavioral1
Sample
20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe
Resource
win7-20240903-en
General
-
Target
20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe
-
Size
61KB
-
MD5
64ebc72246ae91ffb5e87c177f24d1f0
-
SHA1
6466d3b163bd4a74483edc139ce3a290301fc1ec
-
SHA256
20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2da
-
SHA512
ac3043047f7e9e1d893307c41ef177f92fd66db422cb51035ff805072d49d43a3ff321772cf78ccd61b018db7f9f916bf18d9827dc4c05aecb5b75ce9013fe22
-
SSDEEP
1536:1d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZWl/5l:9dseIOMEZEyFjEOFqTiQmUl/5l
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2136 omsecor.exe 2760 omsecor.exe 2940 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2176 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe 2176 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe 2136 omsecor.exe 2136 omsecor.exe 2760 omsecor.exe 2760 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2136 2176 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe 30 PID 2176 wrote to memory of 2136 2176 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe 30 PID 2176 wrote to memory of 2136 2176 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe 30 PID 2176 wrote to memory of 2136 2176 20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe 30 PID 2136 wrote to memory of 2760 2136 omsecor.exe 33 PID 2136 wrote to memory of 2760 2136 omsecor.exe 33 PID 2136 wrote to memory of 2760 2136 omsecor.exe 33 PID 2136 wrote to memory of 2760 2136 omsecor.exe 33 PID 2760 wrote to memory of 2940 2760 omsecor.exe 34 PID 2760 wrote to memory of 2940 2760 omsecor.exe 34 PID 2760 wrote to memory of 2940 2760 omsecor.exe 34 PID 2760 wrote to memory of 2940 2760 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe"C:\Users\Admin\AppData\Local\Temp\20f53444e71ff434f914ab62959c685c949e976ec39a086fef772f2ada75e2daN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e31b9fbb29b59a38862c0a8e323172f1
SHA1ac2878a06e9f5470629777eeb1909a5d9004e5f0
SHA25601f9f2f25cf2487fd55763872770dad340e0634b6c75a5285a7ba53412b3c58a
SHA51290e4b3c5309dd79eef235804f5a11c77f3cc86355ac5436f375ea19860c3af4c97ef5779abda7b3e62fbb436fbc1282e8a9de3b80cc70513ab5f148f645456e3
-
Filesize
61KB
MD59931faa5df29ced5c7e542346e76e941
SHA1a6c5ffe5522a477faeb352a511bc621775171baf
SHA25689f6a244ef5cd86c7161cf657f23a8acd6c409a59ce40bbdbd9b6f20604d8b56
SHA5128732a7797733f296425dc2419089e86e87cd94b809de0aaaebee513e764d9147c22faab4f17540f844ce80c3af2a36294915934883941d28b8c56d42677d0d55
-
Filesize
61KB
MD5c9fd7f377df559dc73f6c897a879954c
SHA1c1bc0369675d0ea1b8c185684f8e1fa0e6116496
SHA25622d22a9d6ba4ed552f5d159bff047c1fb640ba341b1f69fa82a632294a5ddf63
SHA512f6e59245080b89cb4817a14a7a9df5a7325b7babe33f5f0db38d35398c729d727d99506b298da3f7a674f24897e9be6dcbb018ea185cac312808f455499baa65