Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 06:44
Behavioral task
behavioral1
Sample
f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe
Resource
win7-20241010-en
General
-
Target
f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe
-
Size
64KB
-
MD5
faa1f0708a24f1248f743e820a405109
-
SHA1
a412e6fab7fb4dcdb7f5d8c2994649380056e7a0
-
SHA256
f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a
-
SHA512
261f2f1c3982146fbef8e58b7cc0bd507af25e70f40bc3cb382f8f161d3409d17d10ebb742dc7e5c1a95482273cf7843af92f11ac5c7c739254f1e2732d3d9e8
-
SSDEEP
768:KMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:KbIvYvZEyFKF6N4yS+AQmZcl/51
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1916 omsecor.exe 3008 omsecor.exe 2660 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1064 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 1064 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 1916 omsecor.exe 1916 omsecor.exe 3008 omsecor.exe 3008 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1916 1064 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 30 PID 1064 wrote to memory of 1916 1064 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 30 PID 1064 wrote to memory of 1916 1064 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 30 PID 1064 wrote to memory of 1916 1064 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 30 PID 1916 wrote to memory of 3008 1916 omsecor.exe 32 PID 1916 wrote to memory of 3008 1916 omsecor.exe 32 PID 1916 wrote to memory of 3008 1916 omsecor.exe 32 PID 1916 wrote to memory of 3008 1916 omsecor.exe 32 PID 3008 wrote to memory of 2660 3008 omsecor.exe 33 PID 3008 wrote to memory of 2660 3008 omsecor.exe 33 PID 3008 wrote to memory of 2660 3008 omsecor.exe 33 PID 3008 wrote to memory of 2660 3008 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe"C:\Users\Admin\AppData\Local\Temp\f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD51c347f2656a9aa3867ecb159f99856d4
SHA13d88ae5cbb444b98c515e00507cd3d2063d42d51
SHA25648e8a3f4939995f5ff2fc1fa5a8e2ba03897d0fff924f28c51ed3d55a07b98a9
SHA51292e832605d20876945463d924a993eabae5aa9a74f2816bf71949466ceae2013f09c50ec3808e79943ef7a3c2b7ed81e7155c8377b3e62885c73cb652a9f080c
-
Filesize
64KB
MD55da73bf637fba84a7388adb2617192e4
SHA1fe7f4bed7f004a7efa3e9e4e2464e20e18b36a59
SHA256082fd0f9573aee5e62f395c69fb62924e5c0c48ee7d223954c42df160426f755
SHA512c5c0132f756bcd74da7f00463d8a4ca999dcbce4cd28492091291cd33b6a45df3f85578bfdde008b91a6bf8e8af40e817e13beef5a985ad21e7c2cf482c93185
-
Filesize
64KB
MD567bee810250bac5845ca7003456d51f7
SHA15e97e1d2dbb68ca9a330c79046fdd1e5fbadd892
SHA256930c9d0a601a29ca5d46277b5f0139f48a1b12ad6aedb3e0f918f35aa997aea6
SHA512ed7b35e24b5b89456a6fbdea44ec26e7ba33ef2e11bd00621f76cb603d744f339fd71d83b3e2f4da230b41c56536d0c33443aba9473caa3913127d09a55eeb88