Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:47
Behavioral task
behavioral1
Sample
9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe
Resource
win7-20240903-en
General
-
Target
9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe
-
Size
88KB
-
MD5
8711594e145da589ed6e749628a02440
-
SHA1
81972941e5cc4d0eb97fdfcac6e300545f68786f
-
SHA256
9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0b
-
SHA512
9408076bf2001750e83b02e6af100dc681d194acb0eb98dcecb5d38618ad77f3c20bae2ae791630c60d229c3122e0cf6ff49b2a10c6102efaf6cf15c233e805e
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5R:edseIOMEZEyFjEOFqTiQm5l/5R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2016 omsecor.exe 1388 omsecor.exe 852 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1916 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 1916 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 2016 omsecor.exe 2016 omsecor.exe 1388 omsecor.exe 1388 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2016 1916 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 30 PID 1916 wrote to memory of 2016 1916 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 30 PID 1916 wrote to memory of 2016 1916 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 30 PID 1916 wrote to memory of 2016 1916 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 30 PID 2016 wrote to memory of 1388 2016 omsecor.exe 33 PID 2016 wrote to memory of 1388 2016 omsecor.exe 33 PID 2016 wrote to memory of 1388 2016 omsecor.exe 33 PID 2016 wrote to memory of 1388 2016 omsecor.exe 33 PID 1388 wrote to memory of 852 1388 omsecor.exe 34 PID 1388 wrote to memory of 852 1388 omsecor.exe 34 PID 1388 wrote to memory of 852 1388 omsecor.exe 34 PID 1388 wrote to memory of 852 1388 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe"C:\Users\Admin\AppData\Local\Temp\9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5060a13e36b6c5de977f6778097299930
SHA163d7350bffd39621b26c686cd7371a7afe0ab1bd
SHA2560088edf6ce9971ef8c407affd03d5f53f5caed92f18ec73ec96f9301437f2f58
SHA512c0eed25fa42149fc16a078196ad9e4897ce37b7334145b0f315d79ba7be231a5ff8d53dd09a9e67ffc200d56f902bfdab38f3214747dc91bb002d062bc71091a
-
Filesize
88KB
MD58ba5a20c9f9f5cbf569709d4e5da8de7
SHA1e6800233dbedeba4c45163eacb9f90e4862759bd
SHA256c8f1a4f966d3d72c30d000cd306f298cf033558f794cbc014f3151eba81a84ee
SHA5128d906c0d710b1e4ebd7a229f4b0edcb27198559eeac2ea88f04b08166033e493c1517535a0f498045535b96a6a6ac07a3e4b76559ac6b250c543417e4c86ff36
-
Filesize
88KB
MD5b4134414cfacada5ce505f301bfdbcb8
SHA130a3406ec8d4c39e1e25ec73a1165c1085958f70
SHA256a0c8119c86706deed41c9962603e69c4a4acaec70db157a13313cfa586dc956b
SHA512b32c24f00c089cdbc403c7b1138cf9452ec74999167df269e042fdfb93de88684e24b13bb8ee84e8ec1d9653430bf831e01fc14e36cab579797ffca732db85bb