Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 07:58
Behavioral task
behavioral1
Sample
db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe
Resource
win7-20240708-en
General
-
Target
db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe
-
Size
61KB
-
MD5
d376f8fb586d399cbc7fbcea97191c40
-
SHA1
54d2dc2fd119b41138f1c458312bcc73a4965bd7
-
SHA256
db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3
-
SHA512
fab8a20ab385249b6102cd3b009bfdaf44753374e7959e292ab237229f1575b3b6f086bf2e1d12030e3ec4f70f564cd47fa5ca478c9674546943b89c534e6f34
-
SSDEEP
1536:Md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5:0dseIOMEZEyFjEOFqTiQmcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1916 omsecor.exe 672 omsecor.exe 1788 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1724 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 1724 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 1916 omsecor.exe 1916 omsecor.exe 672 omsecor.exe 672 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1916 1724 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 30 PID 1724 wrote to memory of 1916 1724 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 30 PID 1724 wrote to memory of 1916 1724 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 30 PID 1724 wrote to memory of 1916 1724 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 30 PID 1916 wrote to memory of 672 1916 omsecor.exe 33 PID 1916 wrote to memory of 672 1916 omsecor.exe 33 PID 1916 wrote to memory of 672 1916 omsecor.exe 33 PID 1916 wrote to memory of 672 1916 omsecor.exe 33 PID 672 wrote to memory of 1788 672 omsecor.exe 34 PID 672 wrote to memory of 1788 672 omsecor.exe 34 PID 672 wrote to memory of 1788 672 omsecor.exe 34 PID 672 wrote to memory of 1788 672 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe"C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD543a16307e3106ad4a63ad0fe6946cb00
SHA1d21258948d93b227fe71f6f23127fe7899383cf8
SHA256643fd3f7ec27be66a70234ae01c202f12b69b01bf0454803e7c6a536b47c5982
SHA512764f93cbb568ae0c1cce65486753c0e4f37a3d264eb81469502ab4101f42db6e33cc89738f00066a7827df8790073f5f9ba7307f058e28ea03903c2f7a18bd63
-
Filesize
61KB
MD543fc0258dc27d2060ff6ae68a7e4c288
SHA10552ee7c63602c18d708da07b6f6f18f5f4be62a
SHA256fc0e1d8129229c8456ca973085b39492253f3379d7a59d831fc3ad83de51df54
SHA512c0c2e42452a667dc4e0231797e3593b17ce99f5bb9d7817af460c18788883756d50d2d971b9387d2013d37e32f753f19763afb25f2f95f2886cf89b311a9ab26
-
Filesize
61KB
MD5c7e260a81b6b71adfa9ec81efcbc586f
SHA14ccee1b9fa293f5beb3cc776d9da76dc320b2c5f
SHA256d5181d23ee34298b13dc2cadaa067e8cf39f94fa9c725c84f7794556f5866a8c
SHA512d3970fe07032db8076ad7abfb1fd64f5ca0ef3013a94eb292489bdcc68521a6f74d71d9731be28312da794a31b1640ef51b814704d2e8bad9a273c1a487b61b2