Analysis
-
max time kernel
115s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 21:27
Behavioral task
behavioral1
Sample
9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe
Resource
win7-20241010-en
General
-
Target
9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe
-
Size
80KB
-
MD5
cc96a448da3ece78d16d94604b43b985
-
SHA1
424992ddd6f9af348df53e5d084945db032bedee
-
SHA256
9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077
-
SHA512
a9266a10afceb0456b18b23f171263a77ab80b55c5b9fd631c673fdb0f0ac80eb8d3b2f675e487a76fe47e7bb12a4280b08de78ca4fcbf8d446c153a3e6d8204
-
SSDEEP
1536:pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:pdseIOMEZEyFjEOFqTiQmOl/5xPvwX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2568 omsecor.exe 2708 omsecor.exe 3036 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1968 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 1968 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 2568 omsecor.exe 2568 omsecor.exe 2708 omsecor.exe 2708 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2568 1968 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 30 PID 1968 wrote to memory of 2568 1968 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 30 PID 1968 wrote to memory of 2568 1968 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 30 PID 1968 wrote to memory of 2568 1968 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 30 PID 2568 wrote to memory of 2708 2568 omsecor.exe 32 PID 2568 wrote to memory of 2708 2568 omsecor.exe 32 PID 2568 wrote to memory of 2708 2568 omsecor.exe 32 PID 2568 wrote to memory of 2708 2568 omsecor.exe 32 PID 2708 wrote to memory of 3036 2708 omsecor.exe 33 PID 2708 wrote to memory of 3036 2708 omsecor.exe 33 PID 2708 wrote to memory of 3036 2708 omsecor.exe 33 PID 2708 wrote to memory of 3036 2708 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe"C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD54ab95885156eb0c7b76a8d6409bcb777
SHA1882780a57600124af2f6a8cd17dcaf7e4f454352
SHA2561c306811a9b15b7f80b78494a31208217709eb26b324c23dbca75b504341fda2
SHA5122b81f79df7f4cad9e0314004026f4489d5cdbacd99617f4ec72a7d372a7971fd535b7d40d15dc5c76233202ea7320a00d8a0225e98469dd427d10127ae1836c8
-
Filesize
80KB
MD51b06d285a05dfaec310061e5b0857a33
SHA14da4e17e1ef186c8e9184aac9ce24bcb74578340
SHA25602b980eead4fd2bb4c1d1e9d61235de437f0c42c8c723a36bf1936d27a730ba1
SHA512b6af4b397c722465762cd46836733ae6df7e7b42282b2946c726982fb8b98c6a5306188f473f7a2ca12919ca9c008a7e1159acf4896fdaf476d45cc52b93d143
-
Filesize
80KB
MD58947199622cd1c8667d7502ffa16b947
SHA106f60c84d71d6c74896b7a632a616d483f8c202d
SHA25625f2bf514f47c76453a2fb8727385a6cb7c4cc32f636b36cfd9647d891a58895
SHA5121875d25ed2a9eaefd77ce411740f5143ab71b467f611cb4a9f0efa3aba6302cc7668276413ca0d78aa746fef98168aa8bb80aee1f40d77fc35b706a18a0c06f9