Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe
Resource
win7-20240903-en
General
-
Target
49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe
-
Size
33KB
-
MD5
493ff34e77901f716fab30569f3128b1
-
SHA1
34306b4a8a27bb745b8dfc769243cc762bd64c9a
-
SHA256
49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4
-
SHA512
16dbef0509ef3b4be44ab3e866b57fc4f782f2b9f280ee7e2bf000275adabe03fe9a7b76a9c7f4372aa7257f04237dfbeef676654fea95518f4bfd100d3b26ba
-
SSDEEP
768:KfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:KfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2532 omsecor.exe 2592 omsecor.exe 1464 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 840 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 840 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 2532 omsecor.exe 2532 omsecor.exe 2592 omsecor.exe 2592 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 840 wrote to memory of 2532 840 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 30 PID 840 wrote to memory of 2532 840 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 30 PID 840 wrote to memory of 2532 840 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 30 PID 840 wrote to memory of 2532 840 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 30 PID 2532 wrote to memory of 2592 2532 omsecor.exe 33 PID 2532 wrote to memory of 2592 2532 omsecor.exe 33 PID 2532 wrote to memory of 2592 2532 omsecor.exe 33 PID 2532 wrote to memory of 2592 2532 omsecor.exe 33 PID 2592 wrote to memory of 1464 2592 omsecor.exe 34 PID 2592 wrote to memory of 1464 2592 omsecor.exe 34 PID 2592 wrote to memory of 1464 2592 omsecor.exe 34 PID 2592 wrote to memory of 1464 2592 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe"C:\Users\Admin\AppData\Local\Temp\49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f92fc5e0628606295f6cd606c22117ac
SHA144dc0ffaba50c24431bce011255103c07790c587
SHA2565391afaadd073bee9decab8bfbb45a74dffe284d692c1e74eed880a17b4cc1a5
SHA512aebbd0544743f923f38cb8e1c8592d75e31f4d41ec9a6276937a256e62e85f0d8900a5e04a6d59f9e55b3ad9907b72e4e19c4d94365eb2caf52492b24cc2bd57
-
Filesize
33KB
MD52d47ebd5eaec93a9032a9cc912d85308
SHA1dfb0773c080afb59e6a2fe1a0fe90364cf67d93c
SHA25668798b34eb555c8245b008d44d640ed5d45a3dfe07aff1854afdc36246ff67d8
SHA5129e9284346ca3af23efda38e7b8a82138c2c457ef46390cdb2bc1cacd9a185ff2e95792f430c5670138a09a52fc02a952c20fdf12fe6c8bd1abecbaba8f56a1f3
-
Filesize
33KB
MD522edb81ea84f7e22b8924f3354e6dfeb
SHA1174d48d4f89aa17218b2f5c2e8ecca15cb81e51a
SHA256eacb0f04942d6d77741783ac004313f7845d54dde9ec9e11a0beffb61a6c4af5
SHA5125ea2d0505bfbd2598d9326d15b001a8c6cd40e8f5fa985df8725c83cb530357b56c9f40ba7b07a48d914bcc4d4af2d105b6ae285a2faca4b99ca25e843eed6ce