Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 14:47
Behavioral task
behavioral1
Sample
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
Resource
win7-20241023-en
General
-
Target
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
-
Size
72KB
-
MD5
875b37b1081e4e898456c8cdb9d500fe
-
SHA1
388d7d3a4dba9115741a5f107fcc48471508573f
-
SHA256
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0
-
SHA512
496489eee7710b0adfedd489d90cc3157fa5001bc9d3c71f7283bdeb11919e8e2f1bc2fc1c312af39f449375bcdd8418475b1c4e6dc190a4cc753e76ed25b78a
-
SSDEEP
1536:Bd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211X:xdseIOMEZEyFjEOFqTiQm5l/5211X
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2808 omsecor.exe 2156 omsecor.exe 3044 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2612 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 2612 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 2808 omsecor.exe 2808 omsecor.exe 2156 omsecor.exe 2156 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2808 2612 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 30 PID 2612 wrote to memory of 2808 2612 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 30 PID 2612 wrote to memory of 2808 2612 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 30 PID 2612 wrote to memory of 2808 2612 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 30 PID 2808 wrote to memory of 2156 2808 omsecor.exe 33 PID 2808 wrote to memory of 2156 2808 omsecor.exe 33 PID 2808 wrote to memory of 2156 2808 omsecor.exe 33 PID 2808 wrote to memory of 2156 2808 omsecor.exe 33 PID 2156 wrote to memory of 3044 2156 omsecor.exe 34 PID 2156 wrote to memory of 3044 2156 omsecor.exe 34 PID 2156 wrote to memory of 3044 2156 omsecor.exe 34 PID 2156 wrote to memory of 3044 2156 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD59beb25be2eb8a2890632a1dec901a6c4
SHA11eee417a92708f84d85fd115274676200532ac86
SHA25628899e1637cf9cf155308ad9a94f67564d22ca4585928b8613d100dc71d2808d
SHA51239e546262f1be5affb2d9c45fd35457c3b11a2c296be42f7c94a48b104b4be477f63f11a54fb6c7fa9aa3bcb47ee7bc17a37a0e2f5b9a5854aa5ce92ca1b2903
-
Filesize
72KB
MD5b1b0070b770a625af2cdd76f6b6e66f7
SHA128cf7b71049ff1f22fd5d8117ce3516008c7f2fc
SHA256cc42110ab423fd9e1130545a82a7c01695431bd4107b9be5ba3dc38b0c6eea34
SHA512e02c8b4a46eaec77c6f0a47d35f512efb0bfa92e87c10ef3ab3bea2167df400703f7a15b1ebf08b511603237bfe53a99504c5f01e407b62b3185931594fa4d7f
-
Filesize
72KB
MD5be5241dd4c7697ea22cc980bc63a00a1
SHA15404c1179ada97c2a41655d7c0c6245d5e2712ce
SHA25679ea1cc668f8d227f6c13b7e9bdd1712c2ba1b07094885e9b1ceeeb27904c704
SHA5123f4c38cb110b1e7521997bd21fda92a52c8eb950a286168b1b3d06344175afe86161e07b5e450cda9471346b1c9559f88057c8228d593357245a774999cc7ecb