Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 13:41
Behavioral task
behavioral1
Sample
552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe
Resource
win7-20240903-en
General
-
Target
552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe
-
Size
76KB
-
MD5
1cb116e774a27cb62cb868a1a9d0539b
-
SHA1
a26c3440eb2f7ea83ab8bf5551c33ce3440097cf
-
SHA256
552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919
-
SHA512
38db25d06185eb26e62733d75e41ed52029648c93c2bcd59253d606dcb1df7f78e6883626797c5a149d7cac9421dfa343b5ba6e713b6311140fd7cdb9da7eeb9
-
SSDEEP
768:XMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWZ:XbIvYvZEyFKF6N4yS+AQmZTl/5OZ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2768 omsecor.exe 700 omsecor.exe 528 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2744 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 2744 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 2768 omsecor.exe 2768 omsecor.exe 700 omsecor.exe 700 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2768 2744 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2744 wrote to memory of 2768 2744 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2744 wrote to memory of 2768 2744 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2744 wrote to memory of 2768 2744 552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe 31 PID 2768 wrote to memory of 700 2768 omsecor.exe 33 PID 2768 wrote to memory of 700 2768 omsecor.exe 33 PID 2768 wrote to memory of 700 2768 omsecor.exe 33 PID 2768 wrote to memory of 700 2768 omsecor.exe 33 PID 700 wrote to memory of 528 700 omsecor.exe 34 PID 700 wrote to memory of 528 700 omsecor.exe 34 PID 700 wrote to memory of 528 700 omsecor.exe 34 PID 700 wrote to memory of 528 700 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe"C:\Users\Admin\AppData\Local\Temp\552f4da914522f692d1ec128459bc5b790aa6614f706fa1eaa10a5cdbc00d919.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:528
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD537e2375ec2b62a91aa3670bfa8fd5ff0
SHA1e27702764f32418d4d00dc8f47fdacee2917feb1
SHA256c609c335519a958d595888e249699ac5ae019e4db0c68aa801d532863fbbb7db
SHA51254e518dca27de84c65301aa71c8ca319373f2ff4d292abdb7105347dcb166d239788851a3e1495ea63f94d8adc63b2b177c9f3738ff04cbd4a112ea2da104b4a
-
Filesize
76KB
MD5bb1031787abeae8183712eef66ea2c20
SHA1bc7664d20b001438d9e5547a597af2f597892abe
SHA25663a6f378ecbe8138a4769864e5ac5b3972be96c6e1451b94f057206f16c0ba82
SHA512404d324ff76e64064b41201914b126422689c443646c2e70d637711a451b96d3ff434e6f16ebba21f273ab186238937edd4689aa3f272640729f96a7bcfcb1fa
-
Filesize
76KB
MD59a8ef7cfd3687570fe2bfe41b123047e
SHA113dfcdf0ac78251a0e69ed5099e9f517817d6cb0
SHA2567e55f7f2197c494266cb75dcb30952ce24a920228203e27c2b367905c3a6670f
SHA5126a68a237803186e3da5ea6710aa39ec0a2ff7726317a36f95116ed7cba4ad1535bdb218ae7f24a88f16d62f6002963a96bf0fc58a2b18a2245815692a75a53f3