Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 08:07
Behavioral task
behavioral1
Sample
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe
Resource
win7-20241023-en
General
-
Target
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe
-
Size
80KB
-
MD5
de95f56d652d6d483f6d2c86b5d585d4
-
SHA1
bbb0630319bbc561b9bb85f40feec39957a10dac
-
SHA256
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98
-
SHA512
24ce35bdbbdb323ef8403db13ed92d43d4ad25bdc80ce5570b3046bf41edefb99c8061714f63153cf959deb899daddd59d65a13e5c1298ca257a8100eea521df
-
SSDEEP
1536:Id9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzx:4dseIOMEZEyFjEOFqTiQmOl/5xPvwd
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3064 omsecor.exe 1308 omsecor.exe 1304 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2848 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 2848 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 3064 omsecor.exe 3064 omsecor.exe 1308 omsecor.exe 1308 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2848 wrote to memory of 3064 2848 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 30 PID 2848 wrote to memory of 3064 2848 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 30 PID 2848 wrote to memory of 3064 2848 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 30 PID 2848 wrote to memory of 3064 2848 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 30 PID 3064 wrote to memory of 1308 3064 omsecor.exe 33 PID 3064 wrote to memory of 1308 3064 omsecor.exe 33 PID 3064 wrote to memory of 1308 3064 omsecor.exe 33 PID 3064 wrote to memory of 1308 3064 omsecor.exe 33 PID 1308 wrote to memory of 1304 1308 omsecor.exe 34 PID 1308 wrote to memory of 1304 1308 omsecor.exe 34 PID 1308 wrote to memory of 1304 1308 omsecor.exe 34 PID 1308 wrote to memory of 1304 1308 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe"C:\Users\Admin\AppData\Local\Temp\6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1304
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5cb3686d6977b7ea1566df7e67877782c
SHA1b0cb911b7ecf07ddda676dc2df768b4269968e7d
SHA2569cb22992f7b8183f756e8d2b21b14837593b7386f6be416fa5947ead30df9e82
SHA512eed00face40e1e3512c2ba19b7e3a9e52a4b5b88fb91f92c443cce5ab3bdf62b20288448ae418a3e0155372566bc71a45d6aaa60f1e97458177dd511f54bbc20
-
Filesize
80KB
MD503be010ef5cb0587a786725364168a44
SHA18f029fccde27c604f1e41538fff1e3edaee8f42e
SHA256e0421e9086c04d3e83b998a4b5653a4c71099d3ed688525599bdc6ee49dbdde7
SHA512e85972d4d42eecf3770eff8413141b29003e0a723c88266de4a6a13f1137e8f87c3834f7599d9380dc8e88dd070a1f62a15ba1890152c318f7f308d6d67e9d12
-
Filesize
80KB
MD57aa8617f1b64626c26716f470426186d
SHA102c1fc4c3db521fbc3f38e2400cc0dd75d4c7c0b
SHA2560b5a41efbd58507dd9a233f491481ef64eb10fda17b5e2b519bdd208ef6fe8aa
SHA5128ec11363448b264fd6f552516a42db9111dca0c831c6ea58fd09ecde345f5db6fa37f59e50ba50111108f16a80b61b4f39bc0e9418a0f6934898c010b5a450af