Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 13:35
Behavioral task
behavioral1
Sample
552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe
Resource
win7-20240903-en
General
-
Target
552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe
-
Size
76KB
-
MD5
1cb116e774a27cb62cb868a1a9d0539b
-
SHA1
a26c3440eb2f7ea83ab8bf5551c33ce3440097cf
-
SHA256
552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919
-
SHA512
38db25d06185eb26e62733d75e41ed52029648c93c2bcd59253d606dcb1df7f78e6883626797c5a149d7cac9421dfa343b5ba6e713b6311140fd7cdb9da7eeb9
-
SSDEEP
768:XMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWZ:XbIvYvZEyFKF6N4yS+AQmZTl/5OZ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1956 omsecor.exe 2672 omsecor.exe 2460 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2220 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 2220 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 1956 omsecor.exe 1956 omsecor.exe 2672 omsecor.exe 2672 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1956 2220 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2220 wrote to memory of 1956 2220 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2220 wrote to memory of 1956 2220 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2220 wrote to memory of 1956 2220 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 1956 wrote to memory of 2672 1956 omsecor.exe 33 PID 1956 wrote to memory of 2672 1956 omsecor.exe 33 PID 1956 wrote to memory of 2672 1956 omsecor.exe 33 PID 1956 wrote to memory of 2672 1956 omsecor.exe 33 PID 2672 wrote to memory of 2460 2672 omsecor.exe 34 PID 2672 wrote to memory of 2460 2672 omsecor.exe 34 PID 2672 wrote to memory of 2460 2672 omsecor.exe 34 PID 2672 wrote to memory of 2460 2672 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe"C:\Users\Admin\AppData\Local\Temp\552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5bb1031787abeae8183712eef66ea2c20
SHA1bc7664d20b001438d9e5547a597af2f597892abe
SHA25663a6f378ecbe8138a4769864e5ac5b3972be96c6e1451b94f057206f16c0ba82
SHA512404d324ff76e64064b41201914b126422689c443646c2e70d637711a451b96d3ff434e6f16ebba21f273ab186238937edd4689aa3f272640729f96a7bcfcb1fa
-
Filesize
76KB
MD5218a6c2899e978407d3c8ee2be4b7f6b
SHA1193c467f10cb0dd287df3730cf8bf98afb24e617
SHA256398e45a51817543d554b852435bc4c83b36afb0a0b122af479b14fd3c7f7cea9
SHA512c0d495835c639bfa354adf9c355a66d3f7f23cf640d94d183ab93382704bc7f7c80e185c781a8b5ba05884993879cd71ca25437e7a821f975755085b77dbd284
-
Filesize
76KB
MD551e31e4e10dfb083f9661761e057f318
SHA1ccaed7c91f04a7668b9bcc7ab38e297fa4629769
SHA256213f351fd581e9167875015b2331a69b49cbd38c09ba2f03ff445aa2a3985869
SHA512738099ff207fea76e94b029c10f39c546a9a1d4e0c543a3988b4870dc72f5f7ab4d6e9d06fac092e6e781a64788fc8eecdef48603d2855a0c039fe07768d7fe7