Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 21:42
Behavioral task
behavioral1
Sample
ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe
Resource
win7-20241023-en
General
-
Target
ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe
-
Size
88KB
-
MD5
8e1a22da248cd2516919fc1bacf92de0
-
SHA1
575a3ab9be9678886265cd35d24c3544eceec33f
-
SHA256
ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335
-
SHA512
74b96ac89b30e54d903610298244f29e260f839f04a55836cc550d54c178c424e4a137401b278eeb803c46216668778941e2ad6df50e1de7999bff5b49e99e1c
-
SSDEEP
1536:Qd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5R:QdseIOMEZEyFjEOFqTiQm5l/5R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2152 omsecor.exe 2208 omsecor.exe 2388 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2132 ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe 2132 ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe 2152 omsecor.exe 2152 omsecor.exe 2208 omsecor.exe 2208 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2152 2132 ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe 30 PID 2132 wrote to memory of 2152 2132 ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe 30 PID 2132 wrote to memory of 2152 2132 ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe 30 PID 2132 wrote to memory of 2152 2132 ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe 30 PID 2152 wrote to memory of 2208 2152 omsecor.exe 33 PID 2152 wrote to memory of 2208 2152 omsecor.exe 33 PID 2152 wrote to memory of 2208 2152 omsecor.exe 33 PID 2152 wrote to memory of 2208 2152 omsecor.exe 33 PID 2208 wrote to memory of 2388 2208 omsecor.exe 34 PID 2208 wrote to memory of 2388 2208 omsecor.exe 34 PID 2208 wrote to memory of 2388 2208 omsecor.exe 34 PID 2208 wrote to memory of 2388 2208 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe"C:\Users\Admin\AppData\Local\Temp\ff1c9ae7af4c7c0b20662f8ab118caefbc35c2efb3eba769cc504c2574195335N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD579e51448ddebfa4179d5e4c5137a6b18
SHA1f655d6a44a6114bac6582a35393d2eded75bdb19
SHA25612363a9c833534720e608ac74e31cf3bdb07cf2ecfd6011549c96f4f4ec3249b
SHA5120ce0bf2c5cafcfc913286c7abbd39c8fa2348d965894eb8be2d39799acc0bfd9054fd2c3159c32caf94c7518ac5a802b8094ee5b3603750d718b1d676daef7d8
-
Filesize
88KB
MD5f84c76ce732b1517cd14589d4accd31e
SHA1c0d1802fa3ef3850f19444269dad2c25f60e394c
SHA256fe90ccba616c2a0b39652cf4230e139020316abedb8a3aa6550c2c72e92fea9d
SHA512383e416d200b1b1d29dc473e3b6e865cc250bb3d658a1aca536b6b7e2f27daefeb20c2381fd4908f195e870c29311b2128c7447fc58d33468fed3e199887fd92
-
Filesize
88KB
MD5a5a63300a23054d189a833f42470efbb
SHA119f8e3d81f118c2ecd23c055c0a290f14f9199c1
SHA2564c914c008cd60a56fe35b4939205a510668c512dba0f50865f44b20f43ddea9b
SHA5123fd40cde26312dfcd0170557d2f3fd0895b89c235f531fa71b8bf72e5f9805614f816be154635dbe1097e9dbec6fc49927f540ed97b0ac5593eb71c9c387e512