Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 12:32
Behavioral task
behavioral1
Sample
3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe
Resource
win7-20240903-en
General
-
Target
3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe
-
Size
89KB
-
MD5
8c90eec341cae53ddc095f6284e909b0
-
SHA1
95b69b9bb5968b7f9edff459addd8f3be240e4b8
-
SHA256
3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57b
-
SHA512
3f93b3b650faf489d3aaf6e3a04a5ce2d124b269a377f167c12346184c346df74ec2a69dc88b1ef76858f6df2e73cddbe62f0d79bbc399b4b6a3f952c466c5e9
-
SSDEEP
768:pMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:pbIvYvZEyFKF6N4yS+AQmZTl/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2172 omsecor.exe 2660 omsecor.exe 388 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2696 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 2696 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 2172 omsecor.exe 2172 omsecor.exe 2660 omsecor.exe 2660 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2172 2696 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 30 PID 2696 wrote to memory of 2172 2696 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 30 PID 2696 wrote to memory of 2172 2696 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 30 PID 2696 wrote to memory of 2172 2696 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 30 PID 2172 wrote to memory of 2660 2172 omsecor.exe 33 PID 2172 wrote to memory of 2660 2172 omsecor.exe 33 PID 2172 wrote to memory of 2660 2172 omsecor.exe 33 PID 2172 wrote to memory of 2660 2172 omsecor.exe 33 PID 2660 wrote to memory of 388 2660 omsecor.exe 34 PID 2660 wrote to memory of 388 2660 omsecor.exe 34 PID 2660 wrote to memory of 388 2660 omsecor.exe 34 PID 2660 wrote to memory of 388 2660 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe"C:\Users\Admin\AppData\Local\Temp\3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5ed208d68a2c7dcc78827e9f30600007a
SHA1d22200bcb34d19d59b37e524b00a867880e360a7
SHA256d7fc049dcc78fc9b2ead333cf4b1d71905f09ff0b8346777c853096aa2149c88
SHA512ed6d4b3258bcb357eac73270bd6ca7175e3008f6210825dff5fb09c6284ab5a5e9232e8bad756047165e841f693e1fbb977f621dbea468a7e3eb4903241fb2fd
-
Filesize
89KB
MD59564e0d68fa88cd879e5c72f89ca6ef4
SHA1241b2ec704f324972654ee8417aeae9a03eb1dce
SHA2567ccc0746ee644d9ffd731014f8dee41cc02ddda586e5b68056bf435fe3a6861d
SHA5124efe9af32abb0ffffc63e1259d396b2d47909440a91365834bd25290c494dff0e3e3c1925c934411600c183ba9d3dbe09d374482150ea522cc21ed9d0110a93f
-
Filesize
89KB
MD5b94f23ecad9cdae62d35e7d1117776e5
SHA195bd49c7a84bc3aeb5fa84badf812dacf6723802
SHA25677505ce527f9015b108bfbdd0fff4e18aad7851040d0dbe8244e9d6e8c479095
SHA5129aa44824ac4c8987bfcc0ccec0990d389c66dbaa072ba8473ce034bacbb3f8e6a819c685dfb82ab901257fe108b81e6c976f1b18acf8fbdb32f266449b46aa7a