Analysis
-
max time kernel
107s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 14:06
Behavioral task
behavioral1
Sample
469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe
Resource
win7-20241010-en
General
-
Target
469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe
-
Size
61KB
-
MD5
c0696d718c2cf701ee7c7b5315575320
-
SHA1
cbf659983b7a8cec81aae701d74513d7ac6690af
-
SHA256
469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebb
-
SHA512
60936413445307af261bb0336b34faca1f9312c8c9f242b9e26e1620331b1ed5382c3aa3218d54e5ba5d1e566992948af7d6610193b8d7f131fb2e8c7233d412
-
SSDEEP
1536:Fd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5:tdseIOMEZEyFjEOFqTiQmil/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1552 omsecor.exe 1612 omsecor.exe 932 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2076 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe 2076 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe 1552 omsecor.exe 1552 omsecor.exe 1612 omsecor.exe 1612 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1552 2076 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe 30 PID 2076 wrote to memory of 1552 2076 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe 30 PID 2076 wrote to memory of 1552 2076 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe 30 PID 2076 wrote to memory of 1552 2076 469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe 30 PID 1552 wrote to memory of 1612 1552 omsecor.exe 32 PID 1552 wrote to memory of 1612 1552 omsecor.exe 32 PID 1552 wrote to memory of 1612 1552 omsecor.exe 32 PID 1552 wrote to memory of 1612 1552 omsecor.exe 32 PID 1612 wrote to memory of 932 1612 omsecor.exe 33 PID 1612 wrote to memory of 932 1612 omsecor.exe 33 PID 1612 wrote to memory of 932 1612 omsecor.exe 33 PID 1612 wrote to memory of 932 1612 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe"C:\Users\Admin\AppData\Local\Temp\469a71fafb747205d5acfdf2084514797d58320a433eb079aa7317086f38aebbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD548689d78d10878b72eee24aa2fdaaf54
SHA18cd4cdb7a98d7d25af5224c33f4ff3721456f6db
SHA2563c3955f59216b5f787fe90c9429a29c97330a21e4e7e85f9e3bb4401025df0ac
SHA51288f01d37501237c6f2de9edb93f414fda4443e307f26340d91372f3df9f0c1ca167922ed67de8be511822e27ff20853f558efc2cb8ec95f144ebeb26a129d4aa
-
Filesize
61KB
MD570892694ef76d5105c19ecdadfb5d4ec
SHA1fca598ac3a3b6e2712edd26df97394c0bf910cae
SHA256b74b6ea7812c61313e0050263a3e98dd5f8c38ecfa1d0cfb8d925eb8f3da3a9e
SHA51299fef2f56263d4cc0607228d3d4952bcf8860df4b3102d324064b1bb9e3eabdee695a2d64f80574deb4b9c006a197682949eed4c32c3fcf455ee4d7522a7af66
-
Filesize
61KB
MD5e640b9ee7305396b23cecf1f7fbb5ea5
SHA10e864c7704e042f8449991bfe8679ede35a6e473
SHA2561bd4f090a586dc221221142c3c3a95e0493ca1ba662422fb910d102058554d1d
SHA512794fbb82842b938166cd0da9c6347fbd95f034d7c507c6177dbb107d59099e2c493a1691f086702f194a92e4228fa386b72c0caa0dd69534244a9418bedb2dff