Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 04:39
Behavioral task
behavioral1
Sample
fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe
Resource
win7-20240903-en
General
-
Target
fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe
-
Size
64KB
-
MD5
2a06742f5696965c00733c16274e43bc
-
SHA1
6a31e2c64968220c112a8056ff8a96dd59d8ebb1
-
SHA256
fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa
-
SHA512
5fb9f06afc0353c692e22092350f23cf4e5af6e4c7daae9dac3cf639898fe01b92bad6bac51b17a814d5b6c51bf9d22de13aa4cf9822bb0e4c66648b1cd707b4
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:NbIvYvZEyFKF6N4yS+AQmZcl/51
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2896 omsecor.exe 2860 omsecor.exe 2924 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2852 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 2852 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 2896 omsecor.exe 2896 omsecor.exe 2860 omsecor.exe 2860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2896 2852 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 30 PID 2852 wrote to memory of 2896 2852 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 30 PID 2852 wrote to memory of 2896 2852 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 30 PID 2852 wrote to memory of 2896 2852 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 30 PID 2896 wrote to memory of 2860 2896 omsecor.exe 33 PID 2896 wrote to memory of 2860 2896 omsecor.exe 33 PID 2896 wrote to memory of 2860 2896 omsecor.exe 33 PID 2896 wrote to memory of 2860 2896 omsecor.exe 33 PID 2860 wrote to memory of 2924 2860 omsecor.exe 34 PID 2860 wrote to memory of 2924 2860 omsecor.exe 34 PID 2860 wrote to memory of 2924 2860 omsecor.exe 34 PID 2860 wrote to memory of 2924 2860 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe"C:\Users\Admin\AppData\Local\Temp\fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59c29b196f9691c29658a4d1b3cac6308
SHA18b07aefb5869ab43b3c9c39476a5c8e24bf847be
SHA2565535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa
SHA5121b39ee5ee93ccfb039c762fb2e2b5f5bece3107f6ebef01b8718094b2186bbd2b8ff67eff80dc4107723706038b61f01a9e89b146527c63743ccae65a5feb238
-
Filesize
64KB
MD56ebc15feed7f6f309785d3a917ef5670
SHA169b46ee08fe0ea532db223094bc9b99d8083b889
SHA256381b1ddf2852ff9566e97f406d64cd630367c4cd8b49c02579b42f96550ef6fe
SHA512b55edd6ae12323b54d6721504f07681e70f0ad8a7db7be585fe188f15ca53a288bd1a03549d1f0894c2db1a6c00e31399d20270786a128837ca04f48492ea25e
-
Filesize
64KB
MD56971e4eca7f017d1a8e4f9fae9c765a8
SHA1464759a8c86a30755d7a5badcb75d5698024ebc7
SHA256c9098e34526aa5bd7669eedc322aa48a4fffe8fca5173afaaca578b2c13634a7
SHA51250121cdd5086512b59293517af42dc94bb1b84c804fe906c65c865e1edf8ef70ea4db14ea7b5dd30e4bccd5629ce3b02b2e3d0b55681069a059d006e97562176