Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 05:57
Behavioral task
behavioral1
Sample
fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe
Resource
win7-20240903-en
General
-
Target
fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe
-
Size
35KB
-
MD5
d1b2f0800332562c2195324c89ce7964
-
SHA1
9d1444a323871a58367f9eedcc8bb2e2131c4dfd
-
SHA256
fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a
-
SHA512
0bce2b4a89c3ede2e1c29c97f9fa0527e73968b6fa54dfdf2bf3d319d76669f50f065888def2bdaf6db818764341a782d1d32cd3c52f7b6d9e9632df34df3e8b
-
SSDEEP
768:w6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpBn:H8Z0kA7FHlO2OwOTUtKjpBn
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1292 omsecor.exe 992 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 1724 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 1724 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 1292 omsecor.exe 1292 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
resource yara_rule behavioral1/memory/1724-1-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x000c000000012277-7.dat upx behavioral1/memory/1292-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1292-12-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1292-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1292-18-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/1292-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/files/0x0005000000004ed7-23.dat upx behavioral1/memory/1292-25-0x0000000000310000-0x000000000033D000-memory.dmp upx behavioral1/memory/1292-35-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/992-32-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/992-36-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral1/memory/992-39-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1292 1724 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 30 PID 1724 wrote to memory of 1292 1724 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 30 PID 1724 wrote to memory of 1292 1724 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 30 PID 1724 wrote to memory of 1292 1724 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 30 PID 1292 wrote to memory of 992 1292 omsecor.exe 33 PID 1292 wrote to memory of 992 1292 omsecor.exe 33 PID 1292 wrote to memory of 992 1292 omsecor.exe 33 PID 1292 wrote to memory of 992 1292 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe"C:\Users\Admin\AppData\Local\Temp\fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5ce67b8b9896af06c19b0d88066d17f82
SHA1a9128745417cb73af5816e2a073e577790a4e393
SHA2561c44fdd67eafe6a4cdf825e44e613d82f1ae15ddb88d4f94b42cb5a5f3102773
SHA512824eb7369b6013466f3bfcd472644dedb360afab8427c2471ddbf689a54d5eb82e9f21c909dccfe18d6d315df517f32141d1cb68d6c575caca856e0af4a5d5d2
-
Filesize
35KB
MD584b9e853d6482d8edb08db29c99ce9de
SHA176efdfcf2d639eb7a37b196ca341679d90ea0309
SHA25688b6ca3e4d494ec403ac9bb68769f6267b8ce73b0693e52f8cdfece91efc9b11
SHA5121d380e09cdd9a400125f701ca06a9baab8ce3fd9648e3363222ae77144c563ca61cab8cced9fa580fd0b43d63c4cf0869bb534a34898ccedfbf9d307de2566e8