Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 17:48
Behavioral task
behavioral1
Sample
a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe
Resource
win7-20241010-en
General
-
Target
a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe
-
Size
90KB
-
MD5
c8e99543794cb8b16b2c7a8f8c93e5b0
-
SHA1
7edf14b7178e2da719ea797b1ba39b5d0d5559b3
-
SHA256
a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73d
-
SHA512
edac828172fd9f58058ac40f199a6ff200bb785a29231fe25b0ab45eb7bfabe6f9d00fbec82ec97e433ecb1a8a7031099063b7e142f9a1e5e913d5bf75fc9e72
-
SSDEEP
768:aMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:abIvYvZEyFKF6N4aS5AQmZTl/5G
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 344 omsecor.exe 2124 omsecor.exe 2972 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2568 a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe 2568 a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe 344 omsecor.exe 344 omsecor.exe 2124 omsecor.exe 2124 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2568 wrote to memory of 344 2568 a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe 30 PID 2568 wrote to memory of 344 2568 a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe 30 PID 2568 wrote to memory of 344 2568 a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe 30 PID 2568 wrote to memory of 344 2568 a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe 30 PID 344 wrote to memory of 2124 344 omsecor.exe 33 PID 344 wrote to memory of 2124 344 omsecor.exe 33 PID 344 wrote to memory of 2124 344 omsecor.exe 33 PID 344 wrote to memory of 2124 344 omsecor.exe 33 PID 2124 wrote to memory of 2972 2124 omsecor.exe 34 PID 2124 wrote to memory of 2972 2124 omsecor.exe 34 PID 2124 wrote to memory of 2972 2124 omsecor.exe 34 PID 2124 wrote to memory of 2972 2124 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe"C:\Users\Admin\AppData\Local\Temp\a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73dN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5e7d2cd0245f3cf8ec5a74f561a48b9f9
SHA1abba59d2412f0059506c421640fc5f388f207021
SHA2565c528d647cd99980d98ab2d5f733971735e029ebf9d9ccc2b3c0aeab20528d12
SHA512fdef2e55b421f2033e466e8dc81ceba74f094587908351067ba3afce713ea35d978c09397c6f6549c29ca6aea2a78d44525d6ceab430b36ed2dd3828bcc83493
-
Filesize
90KB
MD5e03143aa9d53cab1cb1a8c427f3b84da
SHA175d271b70bebe3c7f939851795b69266bcb88a3b
SHA25635c22f0e9a7c26a694762789d95441f1d146a18876f029b419d25a84ccc1bc88
SHA512add7f1086e81f13fc53554d3711dff6956b95e2d91835b202d7417a97865de2f2f0025f09e1f38fdf1af4aa55455d42d001e60615327e09b55d644bc0e0a1df2
-
Filesize
90KB
MD54f736f09b211016e616d499f7a3e801c
SHA118b7d75701afd0034fa181a29cce7aeb30a23d8a
SHA2560dfd8987147b285f9c2b6df36e567e47420603de305ecbfe8485423e20b807e0
SHA51258be43b755a018f6e22b8164a5ec6b391364be2bbafce8fac7393460428fd26b86598634d6e4c8faf16166d37de65225edade1180acf96e73438d1795a168474