Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 22:46
Behavioral task
behavioral1
Sample
503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe
Resource
win7-20240903-en
General
-
Target
503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe
-
Size
61KB
-
MD5
5b59fdfc3f93c3b1fd2be24f2632d44a
-
SHA1
54af018f546775e794ae404397ecd91b8e840d73
-
SHA256
503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f
-
SHA512
d9af13bd153563ea0281d549cc2b63445d2d0fa20054b2ce8680ec861702a6ca5fda8c8a6424f907005871c295875a947df0ee0767a0e2744b542e35f2573eb1
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5n:cdseIOMEZEyFjEOFqTiQmcl/5n
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2540 omsecor.exe 832 omsecor.exe 2312 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2088 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 2088 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 2540 omsecor.exe 2540 omsecor.exe 832 omsecor.exe 832 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2540 2088 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 30 PID 2088 wrote to memory of 2540 2088 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 30 PID 2088 wrote to memory of 2540 2088 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 30 PID 2088 wrote to memory of 2540 2088 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 30 PID 2540 wrote to memory of 832 2540 omsecor.exe 33 PID 2540 wrote to memory of 832 2540 omsecor.exe 33 PID 2540 wrote to memory of 832 2540 omsecor.exe 33 PID 2540 wrote to memory of 832 2540 omsecor.exe 33 PID 832 wrote to memory of 2312 832 omsecor.exe 34 PID 832 wrote to memory of 2312 832 omsecor.exe 34 PID 832 wrote to memory of 2312 832 omsecor.exe 34 PID 832 wrote to memory of 2312 832 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe"C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2312
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD57713f1899de3e4305d00795506b0b033
SHA1ff9d2ba4fc6afe3200dcd6d5b7572bee16de8b49
SHA256985036d325c077910c1e1d6681eb813936e04b6f465f11686ace0b18baaf3ce2
SHA512b713ba4b098774b751a093198ac3a2c402748314f8b02ca3566b87081b3ac71f5e9ea5fabba70dd8e1adfbc5e49011ae28eea4138edf5b497ec1c1ae51c53996
-
Filesize
61KB
MD5c4bc739cb17bfe756a9bad133d509db6
SHA115199376728e593a69e39b547291ab8447021520
SHA256e27bb9fe14b2bd27c9b7174da99add52be89a6bd5a47fc748b977aa9edfc4b3c
SHA5129548b20f2e08412084b00852f9279e936e4a41456d2880efaec07a49ca6fbadc1de9362e13cdb007c9d69c057a6d0e7af49d8818ebd1b7a9e0f426a2d86beea2
-
Filesize
61KB
MD57777a654c0c90ec6bde2c92cb5184c72
SHA1743c8b87e94419527f118fa55b21a076a6e39838
SHA256c22c1507c0bf7d8005860df9b97135ad5899eca7d3a7e02e8f3fc67d24bf4485
SHA5127dc5739c18c99f782a4c6c42c01a81c2b9419ad845102a7e6c28c51ccc368a856ec89034be58cf382f11059df2778d09c07fedd8c01349682aafb0bc098d56f3