Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:44
Behavioral task
behavioral1
Sample
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
Resource
win7-20240903-en
General
-
Target
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
-
Size
76KB
-
MD5
2b07ebed6c3cb422b0282d9e1a54037c
-
SHA1
6bde080396fdb0e8ac34a665519e6473b53fd964
-
SHA256
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac
-
SHA512
9a4ff2373e5dbda86ac3ac7d0dd05871e39a85db039cdf8311a62c4784f67ea847ceea7c46278756050df03980539d752624494792fdc2ac351c0c620d422c1e
-
SSDEEP
768:gMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWr:gbIvYvZEyFKF6N4yS+AQmZTl/5Or
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2552 omsecor.exe 2872 omsecor.exe 1384 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2960 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 2960 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 2552 omsecor.exe 2552 omsecor.exe 2872 omsecor.exe 2872 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2552 2960 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 2960 wrote to memory of 2552 2960 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 2960 wrote to memory of 2552 2960 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 2960 wrote to memory of 2552 2960 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 2552 wrote to memory of 2872 2552 omsecor.exe 33 PID 2552 wrote to memory of 2872 2552 omsecor.exe 33 PID 2552 wrote to memory of 2872 2552 omsecor.exe 33 PID 2552 wrote to memory of 2872 2552 omsecor.exe 33 PID 2872 wrote to memory of 1384 2872 omsecor.exe 34 PID 2872 wrote to memory of 1384 2872 omsecor.exe 34 PID 2872 wrote to memory of 1384 2872 omsecor.exe 34 PID 2872 wrote to memory of 1384 2872 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1384
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5ace68b1292f3c41f54e0154cdcdd82fc
SHA1e44b82bc2e4e06647cd9021a3d58de9b1b4f6882
SHA2565145786012d333510feeeb81c4c3115949a56e327a3eda440de6738665fd923e
SHA51289e01fe097fc2a7ccaef4f95e158f7e844f18982c09aa206a222f798e7458b41901ee2e4b7c02b1c1447079ed99f467eee8ce8cfac1839f699c818c78b4814d9
-
Filesize
76KB
MD5d5ce00e43bcdc6cd05cdafc7fc2eaf8d
SHA12fd7af05b43427630b305ddc74e35a4487810958
SHA256a342e7e20056788edacb5ca07dd5d50474ca9bc1779ba0681a375fe25b93ea2b
SHA51237d62168f271320a8f666596abab9f6265158b5bf63a018c0f8e0543c6abfaf1a64c5832164d634d9352ce25b53c639015de0de7384db7e94a4aebcbb185868e
-
Filesize
76KB
MD537058079a435e55b4bc56cd01b9e40f4
SHA18f457eb8bbcd561cf9bc9137a2c82a28ac45047a
SHA2568a34f761f5ce1a52948423332abf46ebec78bb9755928f4fabcb8c04adeb5000
SHA512dbf3ed15f4f0585e4dde2962bae057f2ebc70d9c7a5a8e1ba9a57e150621c7c99ce07646c1cb862a886ae4030f16d34ddea350f38191f9c109178905673f25af