Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 01:22
Behavioral task
behavioral1
Sample
622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe
Resource
win7-20240903-en
General
-
Target
622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe
-
Size
80KB
-
MD5
7ff47073999fa2bf7d182d25da9848d0
-
SHA1
c59e6d35e595dc21ce46845f1b34b39416cc6c22
-
SHA256
622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481a
-
SHA512
3cc4a35afcd1e5d7310cc7186e01c68baf3478ec1a1d92a1b68adb5089affe6f54eada4486ea53fc1466361d6efd2845e91f253a6db7654a5551718f010970eb
-
SSDEEP
768:nfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAe:nfbIvYvZEyFKF6N4yS+AQmZTl/5W
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2040 omsecor.exe 1796 omsecor.exe 1924 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1672 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe 1672 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe 2040 omsecor.exe 2040 omsecor.exe 1796 omsecor.exe 1796 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2040 1672 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe 31 PID 1672 wrote to memory of 2040 1672 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe 31 PID 1672 wrote to memory of 2040 1672 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe 31 PID 1672 wrote to memory of 2040 1672 622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe 31 PID 2040 wrote to memory of 1796 2040 omsecor.exe 33 PID 2040 wrote to memory of 1796 2040 omsecor.exe 33 PID 2040 wrote to memory of 1796 2040 omsecor.exe 33 PID 2040 wrote to memory of 1796 2040 omsecor.exe 33 PID 1796 wrote to memory of 1924 1796 omsecor.exe 34 PID 1796 wrote to memory of 1924 1796 omsecor.exe 34 PID 1796 wrote to memory of 1924 1796 omsecor.exe 34 PID 1796 wrote to memory of 1924 1796 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe"C:\Users\Admin\AppData\Local\Temp\622ee1be5d2f40f19cfea8cb5b16b2ff1749e82cde559c70b095826ef7de481aN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f2ea4f51b5256588615438c81c085353
SHA1debfc847bf17854b35243d3f025a585916a5b193
SHA256d7a48273ce9d8b77ef72402e204c26115fa003412ef6d6679cd73d1b48f3ad5c
SHA51237690d1750ef5a88a66721f371f3c134776f973261c2e5702c8ed239ec2f2eb22e0e85d7e7abdb54b2d2080e3921d3d36b6dbb309e2f42fd600eb3e67510deb6
-
Filesize
80KB
MD56615b06dd67575538e0739323f4c844e
SHA13911bf0ca293cfb5d0c903ea403af5992779f71b
SHA256b988288795cd4e4dfff368b101f7bbdc2061fbcd73474f4cb174ae91d6ac71bd
SHA512e6fcca435a8f315f5612d61a70a277d28d6a14672c46edbd34409d96000836f08e05425bbc123de771da6ed1be6acaa1d13d4ebfd5458a6ceb895f7ab767b54e
-
Filesize
80KB
MD5ed22f24b8960b020be47b42b771b5ec2
SHA148765539f7ec43fcfa16801bfabe187b3f4b8e97
SHA256f7dd9b155dc7cdde7533a586f569cecefcda21740517746631fb0088ac4b736b
SHA512da1afed7f1eac5a91c7d6cfe8ec9c9230ba1679739bd473351eb682f6c470983f738e3ac5d2f3e5f4289f847f9f770367abd3fffbddba400d42b894820c10b94