Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 00:13
Behavioral task
behavioral1
Sample
7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe
Resource
win7-20240903-en
General
-
Target
7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe
-
Size
76KB
-
MD5
58283dc9e1a09139b0de697a8ff26b88
-
SHA1
bed5a32685e344306c973b80f675570b3ddd784f
-
SHA256
7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1
-
SHA512
4cc6ee9d4d4a357229ebd2cafccaa38c1bb5c1e299b391471893dd1b8f2a7054392cbbb6636208a0063c06f63ddad5ccb876abfe128d0baf058baee6909de355
-
SSDEEP
1536:Jd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:JdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2184 omsecor.exe 2636 omsecor.exe 2556 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2228 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe 2228 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe 2184 omsecor.exe 2184 omsecor.exe 2636 omsecor.exe 2636 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2184 2228 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe 31 PID 2228 wrote to memory of 2184 2228 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe 31 PID 2228 wrote to memory of 2184 2228 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe 31 PID 2228 wrote to memory of 2184 2228 7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe 31 PID 2184 wrote to memory of 2636 2184 omsecor.exe 33 PID 2184 wrote to memory of 2636 2184 omsecor.exe 33 PID 2184 wrote to memory of 2636 2184 omsecor.exe 33 PID 2184 wrote to memory of 2636 2184 omsecor.exe 33 PID 2636 wrote to memory of 2556 2636 omsecor.exe 34 PID 2636 wrote to memory of 2556 2636 omsecor.exe 34 PID 2636 wrote to memory of 2556 2636 omsecor.exe 34 PID 2636 wrote to memory of 2556 2636 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe"C:\Users\Admin\AppData\Local\Temp\7a4548c16f2cee1d9ccfe39a0eb8a7e1caa133c30fe3b6d8de8462ba8c4488f1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5eadda070ba850be2852053179dd29806
SHA142567c79508203895f211d05e950064737f07416
SHA2560d56384533bee6ac5e0c299965ed608d339b1becc67f14fd0a0236dadc7f2c57
SHA512a3766bc26f4d9ee40daf9e7f2d8646fc5276ac5651e820690c4cfb93e0c88f416eb6e37f182bbdac579081036f1a74f8c32e334dd788818406c10ccd032e3850
-
Filesize
76KB
MD505951ac570be2178293a69462481e554
SHA1890bb94ca40e58cdf36a232b64c2a86a6e998956
SHA25652f54c7f0987fd0b957bdcdfda20a255cf0d7eeb1001cb7d07e4342de5235308
SHA512aa9052726a914b148f2973d04eca92ea30958105c9aa0c5f9510bebad19a6dac0a71a31e95449aa1cc00a2ee464ac967b150747322e983110563a05ed33589ee
-
Filesize
76KB
MD50b6ebc5641298fb784648ce78e2c76de
SHA1b9835d7714657106ff4d07d03f9c807f8f622a95
SHA256374c6f8857857a5446fbbaa163e8cc801494fcf537acb111d5675e028ca6fa6d
SHA512d414b0ceac0a6f152bbe70a4e280453bd9b955890be6c5aba36ed0a1370ff4e5b8b9d10ca80c4b3adc882556ad956ca107ab50e51ac111fe67d601975df8eaa6