Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 14:06
Behavioral task
behavioral1
Sample
e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe
Resource
win7-20240903-en
General
-
Target
e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe
-
Size
71KB
-
MD5
fc338fd9432acd233b778aead852fecd
-
SHA1
caff8bcd56dfcfc463be596d3be16a6778811c33
-
SHA256
e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5
-
SHA512
9a5cb063018e4078f67bd2d9e3f98aa7e4c8c6557dabf655ca8905bfb2a5999b116316bbee5431aa807b465dba121f8e8d58c38f851a277716f8a6974b1edbd4
-
SSDEEP
1536:Rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH3:hdseIOMEZEyFjEOFqTiQmQDHIbH3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2400 omsecor.exe 1916 omsecor.exe 880 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2076 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 2076 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 2400 omsecor.exe 2400 omsecor.exe 1916 omsecor.exe 1916 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2400 2076 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 30 PID 2076 wrote to memory of 2400 2076 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 30 PID 2076 wrote to memory of 2400 2076 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 30 PID 2076 wrote to memory of 2400 2076 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 30 PID 2400 wrote to memory of 1916 2400 omsecor.exe 33 PID 2400 wrote to memory of 1916 2400 omsecor.exe 33 PID 2400 wrote to memory of 1916 2400 omsecor.exe 33 PID 2400 wrote to memory of 1916 2400 omsecor.exe 33 PID 1916 wrote to memory of 880 1916 omsecor.exe 34 PID 1916 wrote to memory of 880 1916 omsecor.exe 34 PID 1916 wrote to memory of 880 1916 omsecor.exe 34 PID 1916 wrote to memory of 880 1916 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe"C:\Users\Admin\AppData\Local\Temp\e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD57e1414109a66000818508244ed079ea6
SHA107acac5d3d103fc589bb0bb6cc40325d4969c92b
SHA256f6e30974e2cf2ffd8b1b48e9ac95d25166a34a9baa8da0498fd38228535c9727
SHA5120597b37dfb4b5f073495e4daa8585992977ab505e0f11193999d96eee3ed8960fed7e96337bd632e2a0939b852fbcc5c9bbfe836afbf33e5d78b320cf50cc167
-
Filesize
71KB
MD5c2273802ce6797030e410f3ea5d3f6d1
SHA175b002d4557556bd556b6fa096d9fc762496b389
SHA2562605a9c45c2516f6523898614ebe1ee808662d6f4571650cfb651822ccb0883b
SHA512b37617bd80ff9abe0ca637637896f5cab7e1093f765faa066e53cd2e2bba89e29b426b456fa8c33ce17e19fd761e5c61561cbf751cc22d3f1ac5d53b6f0168ae
-
Filesize
71KB
MD5c391751752794509157ed2049af283c3
SHA151dcd1698077faf45dcb440d64ad7c44f9e16d07
SHA256dbca33f6afd8503069105de5f48be0eaba3b12862c377454cadad697e9c238ed
SHA51258a3dcd8fa2b020045b3d46cad742b895fb8b8cf0c99f50cb1ce9d5085547d0d1f132fc3c00b244ab1941682568fa989d8d3e781bee34aab416fd1f89a1e193c