Analysis
-
max time kernel
115s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 09:16
Behavioral task
behavioral1
Sample
e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe
Resource
win7-20241010-en
General
-
Target
e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe
-
Size
80KB
-
MD5
b0957e5c9f6d968a760770b1fc07de70
-
SHA1
bfa31c35bcf1858fcdf8ae02d8e7b5b0efe276b6
-
SHA256
e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5
-
SHA512
214e2ac4521ff8991841c9f028075565a79957052f5e1a0b0d5f45de2c8427c5ed79def4eaff1850ef052505e849bca933b2f715dea21b50cb5993302b50ad47
-
SSDEEP
1536:Wd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzz:udseIOMEZEyFjEOFqTiQmOl/5xPvw3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2208 omsecor.exe 1708 omsecor.exe 2956 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2152 e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe 2152 e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe 2208 omsecor.exe 2208 omsecor.exe 1708 omsecor.exe 1708 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2208 2152 e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe 30 PID 2152 wrote to memory of 2208 2152 e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe 30 PID 2152 wrote to memory of 2208 2152 e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe 30 PID 2152 wrote to memory of 2208 2152 e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe 30 PID 2208 wrote to memory of 1708 2208 omsecor.exe 33 PID 2208 wrote to memory of 1708 2208 omsecor.exe 33 PID 2208 wrote to memory of 1708 2208 omsecor.exe 33 PID 2208 wrote to memory of 1708 2208 omsecor.exe 33 PID 1708 wrote to memory of 2956 1708 omsecor.exe 34 PID 1708 wrote to memory of 2956 1708 omsecor.exe 34 PID 1708 wrote to memory of 2956 1708 omsecor.exe 34 PID 1708 wrote to memory of 2956 1708 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe"C:\Users\Admin\AppData\Local\Temp\e8ec10d0158b89112a1d9de0fd81ca0a8f36d83ee46286755d0f8cc7073599c5N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5bae5be294b8f2c0415511adafa382b9c
SHA1c3300563bff47787b147d2bd365c3bb9096c4a68
SHA256c0c5d0a7baac8d2d6205bec4b17a73826416c3d9ff7804b958acdc7bec8dbeaf
SHA5128db6acc3400c3d791d4c385c0a05036f4f297d57e0e108cb011c813a519226f48eb638bfdb26237b1ccebbeb49c034593e860bf6d522de205a932c207471cb2b
-
Filesize
80KB
MD538666c5fc0e4846f1459e4bc6a2e2e7d
SHA10fe764d6adabbb9367fff4ed15de324e8ffa0f88
SHA256c21420cdc5dc7d3efd7db670b7330e07539d658a3c148f40c3006eaee46cef37
SHA51223aaa9b2d4e6a728b5b02fa1cec62d8ab06a420326e1efb3e19b8a6101c7b43f2722ed4b9a65c2f0eec9aef7373050281bac2467e4c5bfd546a84d47594843e0
-
Filesize
80KB
MD5d64b9345cf9887de353dc8e0899497ea
SHA1edeae98cec8d804b6a253c64d5a9590529975fed
SHA25629b9126baed5f250fbafb27c9854a97b8e57ad161e1244dbd46b2329d3bf161b
SHA5122b131a4cda084b136bef393cd6b64dc14dc68c340c0980e375f079f83d8a224e8b38e9ba924b9bca4659d240b3158b0d681218fb8a54114f7db10dca65d22c2c