Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 23:03
Behavioral task
behavioral1
Sample
315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe
Resource
win7-20241023-en
General
-
Target
315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe
-
Size
80KB
-
MD5
4cac4da6513b2494ea90fea579d6c2a8
-
SHA1
0edede44656cabc718bc91805f135563d7b6f452
-
SHA256
315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d
-
SHA512
ec0d57d1baa87dde2cbfa37472dc961980691a278d147f005544e2cfaab710a633fdf01a1f65b169ff06f7faa74a2038343434ff43d23e0259cef5d8abf42144
-
SSDEEP
1536:Wd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:udseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1720 omsecor.exe 772 omsecor.exe 1508 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2648 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 2648 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 1720 omsecor.exe 1720 omsecor.exe 772 omsecor.exe 772 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1720 2648 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 30 PID 2648 wrote to memory of 1720 2648 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 30 PID 2648 wrote to memory of 1720 2648 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 30 PID 2648 wrote to memory of 1720 2648 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 30 PID 1720 wrote to memory of 772 1720 omsecor.exe 33 PID 1720 wrote to memory of 772 1720 omsecor.exe 33 PID 1720 wrote to memory of 772 1720 omsecor.exe 33 PID 1720 wrote to memory of 772 1720 omsecor.exe 33 PID 772 wrote to memory of 1508 772 omsecor.exe 34 PID 772 wrote to memory of 1508 772 omsecor.exe 34 PID 772 wrote to memory of 1508 772 omsecor.exe 34 PID 772 wrote to memory of 1508 772 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe"C:\Users\Admin\AppData\Local\Temp\315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5829f0322839e78ded1df12fe0335527f
SHA17877c149c9ff6792cd4c0cfbbfaf4897dc72a465
SHA25621f4612a0adb5307edac6542ed828a6a0b5b76b41ced4bd74f1a9fa914a5822a
SHA512add7189d16d66391416348569ef232761c44ee9bcf81a58f52e944d0dbbb38f937a9a0d9213deddfda27616c3f160d4dac64a9cc1d5dc783581feb45c27676cd
-
Filesize
80KB
MD548ecc9a6a90ad0bc4c256bc1aac545b1
SHA180344ac820bf4804cdfd8d68c2fc21d1d02e41b7
SHA2565c3496d9a8794f5260e4a961b06fff67eb0ae3c3dcef2e72ab3cceea4a664f0b
SHA512941a71a4303f8aacd2285c8d7b41c5b6e41072af658702379bced14dfb8ca2193e9472a1f1fa56d86e5fdddeb3865107ade610f5b2a81d821e485c3c48528802
-
Filesize
80KB
MD594684ce67b1848b26e7df6264b578f0b
SHA183639ad2a03628bceff28c4d42f93a86e64c2ebd
SHA2564063781dc501f2e7005c9d0e450857c710d0974f875f91aba72bc3d2011a08f2
SHA512bdfc955ffbb201884c24bb7c0658117665c1a671833a6058f9560672cb01840987689a4933ed192972264a81c1543366ae412827e867982e204254d326210c34