Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 16:19
Behavioral task
behavioral1
Sample
24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe
Resource
win7-20240729-en
General
-
Target
24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe
-
Size
89KB
-
MD5
bbc94aacd015ca2f333cdd6830a88520
-
SHA1
e70f0f5184d16f9094ddb4826be8f2fe85b0c6e2
-
SHA256
24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8
-
SHA512
2300af48bd6e724b2015c12a05ccbe17383d703a109cae0ff68ef1c42fb0ba3b3921006fe5e7594f7467598fcde76f31e135c8f99efb7dcd14528aa610897f78
-
SSDEEP
768:V2MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:V2bIvYvZEyFKF6N4yS+AQmZTl/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1212 omsecor.exe 1452 omsecor.exe 2588 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2076 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe 2076 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe 1212 omsecor.exe 1212 omsecor.exe 1452 omsecor.exe 1452 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1212 2076 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe 30 PID 2076 wrote to memory of 1212 2076 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe 30 PID 2076 wrote to memory of 1212 2076 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe 30 PID 2076 wrote to memory of 1212 2076 24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe 30 PID 1212 wrote to memory of 1452 1212 omsecor.exe 33 PID 1212 wrote to memory of 1452 1212 omsecor.exe 33 PID 1212 wrote to memory of 1452 1212 omsecor.exe 33 PID 1212 wrote to memory of 1452 1212 omsecor.exe 33 PID 1452 wrote to memory of 2588 1452 omsecor.exe 34 PID 1452 wrote to memory of 2588 1452 omsecor.exe 34 PID 1452 wrote to memory of 2588 1452 omsecor.exe 34 PID 1452 wrote to memory of 2588 1452 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe"C:\Users\Admin\AppData\Local\Temp\24e498e6af8fd661096a4172e061efc0a6f239b2e9981d2655aa0f3bb3addcd8N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD51f6542e1751bdbedcf75b9a84acea408
SHA1ca59c78eae82d32d63de23bdf0e3fa3113f56857
SHA25660cc9df907a404b6cc8d53805913183dcf3e998d745e2adf4a207eea822f0674
SHA5124e779d31a6833171b9b3c8a96ba5ddc3938a45fd3200b3353868f20ac0da1d059be947648c929fd1eaff0004ec3b2afe77fdd496d51eb2029a9f78b0979bb4e9
-
Filesize
89KB
MD5bb5aaf0419dbc078daf39c809a1f0951
SHA18cba83d5ce45c4c9942e720d91308a6c33549f97
SHA2561265391da30a5a52fd085b53b70785b6e222a2ab7f9c62c98a7ed6d6474bb0ed
SHA512b523c52ec3c4589a7c357e169898cb8e545f605073b7c2a0b581c250e93fcd2a75b829aa22f3a09fd68d8a7ffe1e523aa3be596e3d9ced3977135ebf9840e9e0
-
Filesize
89KB
MD582eff2a9ce65fb45582db6fb7069a052
SHA1e6a8ee336cbd4514314a576985b039066ab18327
SHA256f1c0af595b398eecbceb6f7df8e6c7447aaf33eaece8c47ad09b8953ce111892
SHA5123a291d9fc3f7b76fa2e731f5482856b3463e9f2f82dce70883b151c797494397c2e335c7ef3b78ca82fccbf21d52818001507107d123992f02944f4e2cd5b838