Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe
Resource
win7-20240903-en
General
-
Target
be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe
-
Size
33KB
-
MD5
89cf0cba306fcc16afb21f84a5a9f7c0
-
SHA1
4cf3747e5e2388305b5cf740cbc3fe3ddbe73c5c
-
SHA256
be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66
-
SHA512
b3744ce8c59d4db32192cc0904b22715b8ff6c4534b12a186dadecf41ffa2fcabea05b447f504d9b88d79cf19d7c19f47e21e353e3b00eb5fb3f8f6f5052ba92
-
SSDEEP
768:FfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:FfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2908 omsecor.exe 2796 omsecor.exe 2960 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2844 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 2844 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 2908 omsecor.exe 2908 omsecor.exe 2796 omsecor.exe 2796 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2908 2844 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 30 PID 2844 wrote to memory of 2908 2844 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 30 PID 2844 wrote to memory of 2908 2844 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 30 PID 2844 wrote to memory of 2908 2844 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 30 PID 2908 wrote to memory of 2796 2908 omsecor.exe 33 PID 2908 wrote to memory of 2796 2908 omsecor.exe 33 PID 2908 wrote to memory of 2796 2908 omsecor.exe 33 PID 2908 wrote to memory of 2796 2908 omsecor.exe 33 PID 2796 wrote to memory of 2960 2796 omsecor.exe 34 PID 2796 wrote to memory of 2960 2796 omsecor.exe 34 PID 2796 wrote to memory of 2960 2796 omsecor.exe 34 PID 2796 wrote to memory of 2960 2796 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe"C:\Users\Admin\AppData\Local\Temp\be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD58f49ae2d78dfecd7adbe72f3acfeefc4
SHA1107a07e49172a2efeea5f0c0314840213956ecaa
SHA2569db1b1b4bb6bd9bd3fd943900cbf849ab30820e3b3b2eaa1937a953206e4115f
SHA5124d26b8644534fa4d5d532172d4211569cc333aa3800671c2416be72ddeb822a9e259d71b25e12ac82f3a2d414dea4ef5fdeb5b423240999e9b385b2f93c62f49
-
Filesize
33KB
MD526ae0504bf448d1cb207017dfbc2a2cf
SHA157b0343cc107fe91f9116f0f52a8f02d594e8a9b
SHA25674b5bdce8e12262caa948cc1a65653491056c4979e7f726f8747929d2819a7f4
SHA512b606b0e2b4bbeeb7f78f48d68c20cf6b3e7de1c2741ab2aaf41fa3abbb543324bff12e721a92b07fa6c664a0007e7302ab59cc8adedd365a76cd91e666d5a678
-
Filesize
33KB
MD50838b31b942ecad218ca85193a25db90
SHA16775e1a6de71dd696b7ec5650d0cba2c734ff5eb
SHA2564f3def020d35f50d6377289e252ee8bbade6fc827f402a18209adae1907ab076
SHA512494ee80569a399dcf3593fc77de26c5d0736d9ce477de3342d9c276f670b6a477b96160aea6808bd2a3657441ea035e50706f62a23bacb1e5577ed32e5a58472