Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:50
Behavioral task
behavioral1
Sample
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
Resource
win7-20241010-en
General
-
Target
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
-
Size
76KB
-
MD5
2b07ebed6c3cb422b0282d9e1a54037c
-
SHA1
6bde080396fdb0e8ac34a665519e6473b53fd964
-
SHA256
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac
-
SHA512
9a4ff2373e5dbda86ac3ac7d0dd05871e39a85db039cdf8311a62c4784f67ea847ceea7c46278756050df03980539d752624494792fdc2ac351c0c620d422c1e
-
SSDEEP
768:gMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWr:gbIvYvZEyFKF6N4yS+AQmZTl/5Or
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2080 omsecor.exe 1092 omsecor.exe 1992 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1664 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 1664 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 2080 omsecor.exe 2080 omsecor.exe 1092 omsecor.exe 1092 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2080 1664 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 1664 wrote to memory of 2080 1664 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 1664 wrote to memory of 2080 1664 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 1664 wrote to memory of 2080 1664 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 30 PID 2080 wrote to memory of 1092 2080 omsecor.exe 33 PID 2080 wrote to memory of 1092 2080 omsecor.exe 33 PID 2080 wrote to memory of 1092 2080 omsecor.exe 33 PID 2080 wrote to memory of 1092 2080 omsecor.exe 33 PID 1092 wrote to memory of 1992 1092 omsecor.exe 34 PID 1092 wrote to memory of 1992 1092 omsecor.exe 34 PID 1092 wrote to memory of 1992 1092 omsecor.exe 34 PID 1092 wrote to memory of 1992 1092 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD535b76a59fe3e58e350e328a7c5d0b0ef
SHA180e92cf83b312479d873a19dbb192734d85a22b6
SHA256650ba52246d3a8ca204765ec12df2141c0f018214ba02cf69f70ae8cb815b84b
SHA512be798e3edec3ac86fd6d4d95d6142d0a85f8e382cab47fba553723ad3d09cd6d63a3b036a2c186b4df97ab4c2458d3e62114382e208070ba1f2a4988d8cc9291
-
Filesize
76KB
MD5ace68b1292f3c41f54e0154cdcdd82fc
SHA1e44b82bc2e4e06647cd9021a3d58de9b1b4f6882
SHA2565145786012d333510feeeb81c4c3115949a56e327a3eda440de6738665fd923e
SHA51289e01fe097fc2a7ccaef4f95e158f7e844f18982c09aa206a222f798e7458b41901ee2e4b7c02b1c1447079ed99f467eee8ce8cfac1839f699c818c78b4814d9
-
Filesize
76KB
MD5578813dd3ea015151ff9266686fcf30f
SHA16292124920520ab0edecc434806e741556f3b784
SHA256283cc0ac662752435186ca7407982f10cac14a38913fc394d03947ad313821cb
SHA5123b94bb13e508aab5d86de8d2e66100535336c522e13157604b0c50c741bafbdbb0dd1ac235d28f5b3ebe77e6e694f2e7dec23ef9b5ab71b255c57a54400b7840