Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 02:16
Behavioral task
behavioral1
Sample
bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe
Resource
win7-20240903-en
General
-
Target
bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe
-
Size
92KB
-
MD5
56e1c906484e85cd017c86523997c2c0
-
SHA1
03515d7daf2de0cd0d086b586d6f549c0c1718f6
-
SHA256
bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faa
-
SHA512
41575b84f49db275a78ebd7f32371b982bb5e0aef349b8d333435322a01491ffc48337bebb563ca340e975eea5601420cb0018389b6803ba23e11d729d5fc739
-
SSDEEP
1536:sd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5f:UdseIOyEZEyFjEOFqTiQm5l/5f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2512 omsecor.exe 2436 omsecor.exe 1176 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2524 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 2524 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 2512 omsecor.exe 2512 omsecor.exe 2436 omsecor.exe 2436 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2512 2524 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 30 PID 2524 wrote to memory of 2512 2524 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 30 PID 2524 wrote to memory of 2512 2524 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 30 PID 2524 wrote to memory of 2512 2524 bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe 30 PID 2512 wrote to memory of 2436 2512 omsecor.exe 33 PID 2512 wrote to memory of 2436 2512 omsecor.exe 33 PID 2512 wrote to memory of 2436 2512 omsecor.exe 33 PID 2512 wrote to memory of 2436 2512 omsecor.exe 33 PID 2436 wrote to memory of 1176 2436 omsecor.exe 34 PID 2436 wrote to memory of 1176 2436 omsecor.exe 34 PID 2436 wrote to memory of 1176 2436 omsecor.exe 34 PID 2436 wrote to memory of 1176 2436 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe"C:\Users\Admin\AppData\Local\Temp\bde8958cf92e7fa43d9b96405e605733169a88cdeb7fdafa00d4e3f9ac573faaN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD58c74992642118d344eccee0b204c2cb1
SHA1358e9af5788f04c9d3c79d7915df96592b69b75f
SHA2565f5fb512d520e54839f4c44f5f8469982b5ceac9a137d0b26f7d0450454e76ee
SHA5129e0e33ccc85880ca06e797eb432f43c2c90351f2e1ff3636a071948595715d83b0f3e4f0b3fffcf1bae180d77f060d076493dd206fde6f440a2782a310a6d078
-
Filesize
92KB
MD5df9f371efd245d53ef48f0d784053503
SHA13870ffcafa37ef3bc2b637becac24e71efd6037e
SHA2567287962d6ea9d0cf18959a5eb3fd7fa51a2362ccd2992a1f0567cda159f74ca4
SHA512d456528134b9667618273c94f3deede0d2d7b5ccdf4b2a5e873aca0f7a118c99de46e245c2990bca3b8b38b3d902b502a94009ca7bba8dcd2ac230d04b699485
-
Filesize
92KB
MD5db2dc2633c094271c14afee22bf56b1a
SHA19551141b4fe846f7b76c37eaa9269a0f6f1e146b
SHA25614c6b5c5dc0819762c2de62cabd2b6dca5d2a2390943035a24bf98ef73f7a109
SHA5124fa6f16f5f676b0cdd3ac4686700444e1e57103ee1aa05fe2d2739b30c4f2781268341fa24d73f91dd710fb71e1c78f470ceb74345771dcd0a7168e6c157a49d