Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 01:57
Behavioral task
behavioral1
Sample
7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe
Resource
win7-20240903-en
General
-
Target
7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe
-
Size
76KB
-
MD5
56080554397ca8fb2f5a16c333bfeb76
-
SHA1
9864307dfc7a84e8a6d45dc742f2cd6415bbb34d
-
SHA256
7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a
-
SHA512
27189da3101a4b1ee18a0609c713b159e0b558d2229603ac23eea698f89cd77369b67c20003a5edf1680cfecb64388c24b74657c3c4d36af3a80cfdf628782cd
-
SSDEEP
1536:ed9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11L:GdseIOMEZEyFjEOFqaiQm5l/5w11L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2740 omsecor.exe 3032 omsecor.exe 3028 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2840 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 2840 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 2740 omsecor.exe 2740 omsecor.exe 3032 omsecor.exe 3032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2740 2840 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 30 PID 2840 wrote to memory of 2740 2840 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 30 PID 2840 wrote to memory of 2740 2840 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 30 PID 2840 wrote to memory of 2740 2840 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 30 PID 2740 wrote to memory of 3032 2740 omsecor.exe 33 PID 2740 wrote to memory of 3032 2740 omsecor.exe 33 PID 2740 wrote to memory of 3032 2740 omsecor.exe 33 PID 2740 wrote to memory of 3032 2740 omsecor.exe 33 PID 3032 wrote to memory of 3028 3032 omsecor.exe 34 PID 3032 wrote to memory of 3028 3032 omsecor.exe 34 PID 3032 wrote to memory of 3028 3032 omsecor.exe 34 PID 3032 wrote to memory of 3028 3032 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe"C:\Users\Admin\AppData\Local\Temp\7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5deceb37af32a28fe04e1bf078e291318
SHA1e90d0b18ff525b25d1dc762183437811fdb71432
SHA256db2518a0afd1ce1ac8a7f28a8bc9464c8f319f8205ed1f36846ea1c97422ac5f
SHA512c00899b183bfc9f16e2024861786ca73b78336f37d4088ca63c7b0f57e934b6703898b636656ecfc3b0ce4c85adc73298b34deb325c4ec11b24b6bc06ed08bf5
-
Filesize
76KB
MD5a6e7dcd449a78d72236b8c72104b530d
SHA10cbc1fd90412c90a9fe77116804ec5327611dc59
SHA2564c1460a431bb583d6ff77e8beb170f55a1263bf627275c4a74fe2921a071e1ee
SHA512f303449961ec615b6350e8bc826f57e6c652bef113cbb9c2ac127d163316fdd7bdae4de72f1728c4863598fc1b1ce345a67437dc66e2317f8065b3a6f934cf17
-
Filesize
76KB
MD57f021d8bdc05da5680baf3ebdba5087a
SHA1f2bad84369333bcf2f977e5210571e4ad5a42a0c
SHA25609931fad4a6722231cb60f27aec9d20814cad0ee0a2cf29f31955263634226f2
SHA5129085dc1c699de020eaa2c60a074b1db380602e212ea1ffae81c9644055556a8346740c5c9d78513ac0c3e4a0b6097b963b176c126fc90842597e7a9c13ac1649