Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 22:01
Behavioral task
behavioral1
Sample
5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe
Resource
win7-20241010-en
General
-
Target
5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe
-
Size
64KB
-
MD5
9c29b196f9691c29658a4d1b3cac6308
-
SHA1
8b07aefb5869ab43b3c9c39476a5c8e24bf847be
-
SHA256
5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa
-
SHA512
1b39ee5ee93ccfb039c762fb2e2b5f5bece3107f6ebef01b8718094b2186bbd2b8ff67eff80dc4107723706038b61f01a9e89b146527c63743ccae65a5feb238
-
SSDEEP
768:JMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:JbIvYvZEyFKF6N4yS+AQmZcl/51
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2448 omsecor.exe 1624 omsecor.exe 2360 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2248 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 2248 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 2448 omsecor.exe 2448 omsecor.exe 1624 omsecor.exe 1624 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2448 2248 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 30 PID 2248 wrote to memory of 2448 2248 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 30 PID 2248 wrote to memory of 2448 2248 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 30 PID 2248 wrote to memory of 2448 2248 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 30 PID 2448 wrote to memory of 1624 2448 omsecor.exe 32 PID 2448 wrote to memory of 1624 2448 omsecor.exe 32 PID 2448 wrote to memory of 1624 2448 omsecor.exe 32 PID 2448 wrote to memory of 1624 2448 omsecor.exe 32 PID 1624 wrote to memory of 2360 1624 omsecor.exe 33 PID 1624 wrote to memory of 2360 1624 omsecor.exe 33 PID 1624 wrote to memory of 2360 1624 omsecor.exe 33 PID 1624 wrote to memory of 2360 1624 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe"C:\Users\Admin\AppData\Local\Temp\5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD599d9dc789400b86dd2c6fdf5552d6ff2
SHA1a7dcdf5962f7fa36b2fb9f2db030f4c04bca15ac
SHA25637fb8f23759defe1a74e73c5417162b9de7fbf9bec53d21944fb3ec0e502eeb4
SHA51247e3794c26d8a3dde4107403199fcef410b434729bd1a5d6d0c82193fc6e16105b68027c4534070f862cdf2a3b6b43c76740d39bfdf628e14a8cb03709a491f1
-
Filesize
64KB
MD5dd0eed6a7bd783cdb04049da3ebcde9d
SHA129664cefbf6451eab325fbcc2f692e2a0ca45d5a
SHA256145b056310da31baba01606bcad39e7ae186204145f2c9f578663f51f57a526d
SHA512c78acdab05dd8217236fce17b1750002e5aee1fe824b525ea5278127c6b593b0539b12d7ecc6ca2b7f2d914a5b280b1552a4553a6dd0587e09d2fb908bd0c1ad
-
Filesize
64KB
MD5b1cfee50ed9a8b8179e75963a8f65666
SHA1ebfced321dc29ba65b595ee668381537828fa82a
SHA256893eec4505ca34d3c32f8623ed1fcd92202cc9272890619b985dc986f600d965
SHA51214427371cfe542a138fb269bbf71b85e65ca9b17e504d7d4375e85ae7ba6aa5f59bba8177fa9bd9bb3ffa02108987adbb98fb85e4422753c42a79b9d7d7f68bb