Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 03:18
Behavioral task
behavioral1
Sample
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
Resource
win7-20240903-en
General
-
Target
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
-
Size
80KB
-
MD5
1a3aad5ce62edaf7923bab44dd9d8727
-
SHA1
03a9efa9b7f04d91b9282d553c98ee1735863ce6
-
SHA256
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab
-
SHA512
c662c0ef129d7ce7b2dfb7ef62529a494ef6a7205fb346477076a4447e38c7b15cf2769a15bccf0602912f0030c656352c5b3a7aa1715b603be89d9ce6d5114c
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:DdseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2692 omsecor.exe 2372 omsecor.exe 1844 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 816 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 816 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 2692 omsecor.exe 2692 omsecor.exe 2372 omsecor.exe 2372 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 816 wrote to memory of 2692 816 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 31 PID 816 wrote to memory of 2692 816 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 31 PID 816 wrote to memory of 2692 816 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 31 PID 816 wrote to memory of 2692 816 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 31 PID 2692 wrote to memory of 2372 2692 omsecor.exe 33 PID 2692 wrote to memory of 2372 2692 omsecor.exe 33 PID 2692 wrote to memory of 2372 2692 omsecor.exe 33 PID 2692 wrote to memory of 2372 2692 omsecor.exe 33 PID 2372 wrote to memory of 1844 2372 omsecor.exe 34 PID 2372 wrote to memory of 1844 2372 omsecor.exe 34 PID 2372 wrote to memory of 1844 2372 omsecor.exe 34 PID 2372 wrote to memory of 1844 2372 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ffb185e8f37f93d3c1711dc2b5c70d20
SHA17e611d60e24f26db99a43bbe1d7be6905bb0c243
SHA25652194a535bb7866c71aa16a7f392eecc41a29907859acaeb58cc11136f3bc42a
SHA512b865b5d05fd2bea01ea47dd750aecc2dc7e1167ae3cac241efbe59d3cdf9fd96ae4ba3ae238903bb612bacf69b0c2b52bc9daaccf33f67de2ce64e958b18b4b3
-
Filesize
80KB
MD55718c185476861b33f1609bbd8dfcd1d
SHA1992ee29ac44cb3324c22a1aed780d83537ee57cf
SHA2563f5479f4db1f7c355548216aae21b51a52e330dc3f9b23342ab9e82680b2df11
SHA5126e4987a6ed3ef47cfc3a5423098c5d5bf499dfd5aa4f80b65b8efbec5ce06d82ac6f7e18a78eaf64e236332f8a38eae3fa1ff917206c8040208e0f5c001d5979
-
Filesize
80KB
MD51a035c7e8a88786d0316aa194dfdbc9b
SHA151240e05573af92be42d56b2591c1abe9330c34b
SHA256953b0dacb5cfb9d447c595057e122d219382005e65093998cb31b0a375a1d549
SHA512a20a5e5e44030915ddb4963b39967ef07efa5450abeb8b14653eb7a1c3b1122e08f539c1a27b5a164ffd809aca6a348f57a8384f2f03ab923c98f8578f3f00b4