Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-12-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe
Resource
win7-20240903-en
General
-
Target
13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe
-
Size
33KB
-
MD5
174cc65b52d2712abb4fd785354d8edb
-
SHA1
a2f05506daa6e297ff362062c60c37a69ffdd646
-
SHA256
13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe
-
SHA512
2b4659652db9a83b58eb0b1067a6251be0e3ac6705730f662898b9068499467fe4c08e4fe4112f1c06a4369a5cad91a197abddb546998c6ef4e58bb13e13e96b
-
SSDEEP
768:BfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:BfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1980 omsecor.exe 2616 omsecor.exe 1772 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2204 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe 2204 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe 1980 omsecor.exe 1980 omsecor.exe 2616 omsecor.exe 2616 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1980 2204 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe 28 PID 2204 wrote to memory of 1980 2204 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe 28 PID 2204 wrote to memory of 1980 2204 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe 28 PID 2204 wrote to memory of 1980 2204 13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe 28 PID 1980 wrote to memory of 2616 1980 omsecor.exe 32 PID 1980 wrote to memory of 2616 1980 omsecor.exe 32 PID 1980 wrote to memory of 2616 1980 omsecor.exe 32 PID 1980 wrote to memory of 2616 1980 omsecor.exe 32 PID 2616 wrote to memory of 1772 2616 omsecor.exe 33 PID 2616 wrote to memory of 1772 2616 omsecor.exe 33 PID 2616 wrote to memory of 1772 2616 omsecor.exe 33 PID 2616 wrote to memory of 1772 2616 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe"C:\Users\Admin\AppData\Local\Temp\13ba8f7cd3d335bead19272aa29180bf87eda84460f99f206aac051ee690c1fe.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5a4fcfa664f1ba24d259c915ecc6884fd
SHA1f87fa0f73b903dd0310db2c813636f336cd461ab
SHA25694902a788741be27fbd662221514b6de67cc1b313bd101dfbb96f2e354adf19c
SHA512f4ce6cadef1cecc37b670f637dbb0897b0c9a1dab7c9751e24a3daea22a4e9a2abe7a6611495702c95360f9634a12175174fd049f5cbd12fa49b123d021adf4f
-
Filesize
33KB
MD5914075639305b381276461529fa77fb7
SHA13e358a6694e0e63be400407ad1ce4aa79b9b6d7e
SHA2564ff1be78a4dd4698f1d799d227cefbc700b160ae06c4f5eb47f6e531f351cfb5
SHA5129530830daa8579d1b3d0a8b2328dd2a6e1e181c2beb9849ae2a72e96e597296179cc8f3f0ca0fbaac5bbf6c4ee230f68e9c31de30eb4bfb02bf0dd9cfab203cc
-
Filesize
33KB
MD5e1c315161cd813e51fd531e1dfddbb6f
SHA159b0cb284edb0a64bb80ef77f546ea3227235ca1
SHA256a7b61ad19bf8ea05a25996d2fe4eb5b68e36f0b63b03060b200b435106405b66
SHA5128d7475e33eb72b480937f3c7beab379c22aae7fcb2dfb12de221c72d733f9a014ac3f241e0f02155874c1868fff0a7e0a545f6b018a4652a8f67e374eb14176e