Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/12/2024, 22:05
Behavioral task
behavioral1
Sample
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe
Resource
win7-20240903-en
General
-
Target
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe
-
Size
88KB
-
MD5
f4fc90fbccd049176e76e4ac9470c4ce
-
SHA1
990e169ef96d575880fc9919dbd529a1bb418060
-
SHA256
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9
-
SHA512
fb986df49e79a46e09af823ffdc2acdea4ec87d163372192183f0083b550e867ce366b910cc2ad4a2ac6f67a20e54595c27317ad133ae52ce71184d55646bdf7
-
SSDEEP
1536:od9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5R:YdseIOMEZEyFjEOFqTiQm5l/5R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1956 omsecor.exe 1592 omsecor.exe 1584 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2364 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 2364 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 1956 omsecor.exe 1956 omsecor.exe 1592 omsecor.exe 1592 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1956 2364 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2364 wrote to memory of 1956 2364 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2364 wrote to memory of 1956 2364 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 2364 wrote to memory of 1956 2364 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 30 PID 1956 wrote to memory of 1592 1956 omsecor.exe 33 PID 1956 wrote to memory of 1592 1956 omsecor.exe 33 PID 1956 wrote to memory of 1592 1956 omsecor.exe 33 PID 1956 wrote to memory of 1592 1956 omsecor.exe 33 PID 1592 wrote to memory of 1584 1592 omsecor.exe 34 PID 1592 wrote to memory of 1584 1592 omsecor.exe 34 PID 1592 wrote to memory of 1584 1592 omsecor.exe 34 PID 1592 wrote to memory of 1584 1592 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe"C:\Users\Admin\AppData\Local\Temp\6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD548891af185479fc1f82a2a9f397a9760
SHA1ee0a085015948917b5aa163dafe85062d236335d
SHA256c1ed09c4504f234b83540c8002c5676bcd12a4723c2307a88328ff803086de6d
SHA5128e1b450a46d8333287f577840d0bc10317f82fe6bfe0875df0f76c3390615ce95eaa486ad21d83eb5847d09671971991100f5c17e84f4ba4641429dfaeba64c4
-
Filesize
88KB
MD5c2404aa9ff85afcb5bd8991fe5c0116b
SHA17cd5e2d9db5b7ce4d42f56bb5734bac7990ad198
SHA2564889202a1c33878ff1ed2bf03326a9e36c7874acb4f5da7ca07c631429ac59ed
SHA5124309c65b8355c57559be9cf5d61077ec9cd8afb2e4c3ee04729c8bc86ad4e8c83afadaa37a987eaad548299f6afa21cee5f755cfab94d476c15a84ee4ab47771
-
Filesize
88KB
MD53474df0af25e1a0e22ae6c8afc70153c
SHA1780e6b06737f9d48ef4c55cb746215c6633d5a4f
SHA25678b9c228429fc4e911e7de681709ea47fe741b108e739d926aa4a46d9ff6ff06
SHA5127300ecdda557f2a47d2bd20783c28a5425a520057c9ce508c44f9ad29a246545304d6adc51b883c6d5d41db28f36f4e06588eb622006aa9c787b71d45a8a40c6