Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 14:56
Behavioral task
behavioral1
Sample
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
Resource
win7-20240708-en
General
-
Target
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
-
Size
72KB
-
MD5
875b37b1081e4e898456c8cdb9d500fe
-
SHA1
388d7d3a4dba9115741a5f107fcc48471508573f
-
SHA256
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0
-
SHA512
496489eee7710b0adfedd489d90cc3157fa5001bc9d3c71f7283bdeb11919e8e2f1bc2fc1c312af39f449375bcdd8418475b1c4e6dc190a4cc753e76ed25b78a
-
SSDEEP
1536:Bd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211X:xdseIOMEZEyFjEOFqTiQm5l/5211X
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2160 omsecor.exe 2000 omsecor.exe 308 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2860 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 2860 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 2160 omsecor.exe 2160 omsecor.exe 2000 omsecor.exe 2000 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2160 2860 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 31 PID 2860 wrote to memory of 2160 2860 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 31 PID 2860 wrote to memory of 2160 2860 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 31 PID 2860 wrote to memory of 2160 2860 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 31 PID 2160 wrote to memory of 2000 2160 omsecor.exe 33 PID 2160 wrote to memory of 2000 2160 omsecor.exe 33 PID 2160 wrote to memory of 2000 2160 omsecor.exe 33 PID 2160 wrote to memory of 2000 2160 omsecor.exe 33 PID 2000 wrote to memory of 308 2000 omsecor.exe 34 PID 2000 wrote to memory of 308 2000 omsecor.exe 34 PID 2000 wrote to memory of 308 2000 omsecor.exe 34 PID 2000 wrote to memory of 308 2000 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD59beb25be2eb8a2890632a1dec901a6c4
SHA11eee417a92708f84d85fd115274676200532ac86
SHA25628899e1637cf9cf155308ad9a94f67564d22ca4585928b8613d100dc71d2808d
SHA51239e546262f1be5affb2d9c45fd35457c3b11a2c296be42f7c94a48b104b4be477f63f11a54fb6c7fa9aa3bcb47ee7bc17a37a0e2f5b9a5854aa5ce92ca1b2903
-
Filesize
72KB
MD5ce872b605d04f6c7cbf824449523c577
SHA122114be7a7087619db6c59f67286fc20d1743a2b
SHA256ce6bc4c83920b6fb9b754d14aeb0a91af47914760b57ed22bb0294c491f6b879
SHA512e75a7ed27228051e550380abc98af7495f0b972959677431211868a862910d4f7ad08301f8a4b0b360b7aad347f8a6ed51a00081317925c5fb101b72fa15af69
-
Filesize
72KB
MD5cbfb7dd297213b3e54b109c48d322d5b
SHA1744389969f23ab751412d00036398bd91e82d621
SHA25651247251b1f5da3e1b826a4ab35ebca4893cfcfdbcb77d7e86930c3663e8c92b
SHA512d5c2c9e41745c11dd28826a7ebe8565dc35f05187c56bdcb61c22eb73f1a7760f00403410b9c43093741763ab6b5655d339d011f02a9d7e93bba4d28d4a5128b