Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 22:10
Behavioral task
behavioral1
Sample
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe
Resource
win7-20240903-en
General
-
Target
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe
-
Size
88KB
-
MD5
f4fc90fbccd049176e76e4ac9470c4ce
-
SHA1
990e169ef96d575880fc9919dbd529a1bb418060
-
SHA256
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9
-
SHA512
fb986df49e79a46e09af823ffdc2acdea4ec87d163372192183f0083b550e867ce366b910cc2ad4a2ac6f67a20e54595c27317ad133ae52ce71184d55646bdf7
-
SSDEEP
1536:od9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5R:YdseIOMEZEyFjEOFqTiQm5l/5R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2280 omsecor.exe 2016 omsecor.exe 2104 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2440 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 2440 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 2280 omsecor.exe 2280 omsecor.exe 2016 omsecor.exe 2016 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2280 2440 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2440 wrote to memory of 2280 2440 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2440 wrote to memory of 2280 2440 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2440 wrote to memory of 2280 2440 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2280 wrote to memory of 2016 2280 omsecor.exe 33 PID 2280 wrote to memory of 2016 2280 omsecor.exe 33 PID 2280 wrote to memory of 2016 2280 omsecor.exe 33 PID 2280 wrote to memory of 2016 2280 omsecor.exe 33 PID 2016 wrote to memory of 2104 2016 omsecor.exe 34 PID 2016 wrote to memory of 2104 2016 omsecor.exe 34 PID 2016 wrote to memory of 2104 2016 omsecor.exe 34 PID 2016 wrote to memory of 2104 2016 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe"C:\Users\Admin\AppData\Local\Temp\6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD548891af185479fc1f82a2a9f397a9760
SHA1ee0a085015948917b5aa163dafe85062d236335d
SHA256c1ed09c4504f234b83540c8002c5676bcd12a4723c2307a88328ff803086de6d
SHA5128e1b450a46d8333287f577840d0bc10317f82fe6bfe0875df0f76c3390615ce95eaa486ad21d83eb5847d09671971991100f5c17e84f4ba4641429dfaeba64c4
-
Filesize
88KB
MD50946888d674e3dc9dcecef4b76a7b389
SHA110eb871e2b8607671370ddb2ddca524b265160ed
SHA25659da62056a56349429e8737750c09c161adcfef9341149ae1f252bf64e8dfe1a
SHA512a1b861fefce7bfeff4d6f4fa22d2d86a66e6645e4feab1ae497725c080013f73483b209807e88d149f71b85edb7e6f8c25cf00aa16df95ec399a94c489ea2f1e
-
Filesize
88KB
MD527e0f90cff876fd61d4cbbf84ed8e9f3
SHA1d8e14a45bf326113d210683ba44b9e28ae2a7e5a
SHA2562553edfc2a147e1dcdffb1243fe8db032af8217711da233e75849918c4b7c474
SHA5126a4ba8a6b8e8508192fea840745f36e9cc56288fa7c5137650a3e288a9c67876e7070ed50696dd9d82f8c7b490a62a1a948109cc12c04ac539aba8cfb3aeb809