Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/12/2024, 20:08
Behavioral task
behavioral1
Sample
6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe
Resource
win7-20240903-en
General
-
Target
6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe
-
Size
80KB
-
MD5
2c6d907a021a3e632cd126097530db07
-
SHA1
091240037a81704fa68ad25dfcde053c137056f4
-
SHA256
6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca
-
SHA512
2d60a2ab443835480d52fb54a9396e29e3dab742c6f7b815ff1b28e9781c6eaa36ce1f05e340a2d42d777e493ce7c0b2f19695ee78b837a344d655d5f045d137
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:LdseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1864 omsecor.exe 2956 omsecor.exe 1852 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2112 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 2112 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 1864 omsecor.exe 1864 omsecor.exe 2956 omsecor.exe 2956 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1864 2112 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 30 PID 2112 wrote to memory of 1864 2112 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 30 PID 2112 wrote to memory of 1864 2112 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 30 PID 2112 wrote to memory of 1864 2112 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 30 PID 1864 wrote to memory of 2956 1864 omsecor.exe 33 PID 1864 wrote to memory of 2956 1864 omsecor.exe 33 PID 1864 wrote to memory of 2956 1864 omsecor.exe 33 PID 1864 wrote to memory of 2956 1864 omsecor.exe 33 PID 2956 wrote to memory of 1852 2956 omsecor.exe 34 PID 2956 wrote to memory of 1852 2956 omsecor.exe 34 PID 2956 wrote to memory of 1852 2956 omsecor.exe 34 PID 2956 wrote to memory of 1852 2956 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe"C:\Users\Admin\AppData\Local\Temp\6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55a53261beb343d0fce658c2c097bd5bd
SHA1e6e54af7f170a02c3d88a6a955a002d76b6513dd
SHA256983cf0501d39b1abdff207cbe6ea75da87157acd47986cfc704eccc2e722d365
SHA512c44acaa209de9796c103c6479cd8ec8272c0b1dbc82df19872e65ff8d7bc01cbe1d2490dc1c4c6618fe00bb3e15d9cdc2b5be024608e89e9aa111547663a5d73
-
Filesize
80KB
MD59ca1206fe04b93dd15781b037496de17
SHA131475b75a25585ae383e36b6dc2f63e0048f5d18
SHA2566592f7658a02a918eb76a643adaf606acb93dc01004569a0b131e0ce1a338e64
SHA51241b08dfd24fd5c94750800f64d9aad1a6191e8765e4ebae1a4899f29e667593748bc26afcc916cb2d1a4303e48c8dabc031825019e05b46aaefc746c2168d98b
-
Filesize
80KB
MD5b607d848bcb65c7e7ac957cf7e2b6b9a
SHA18e3203cfa307e3a48da28a8e018893f53b4df530
SHA2565a375edb4cdac619758e96cbf0c5e21ab4d4ec8f9cb8c3ed658ba9f9de008ab1
SHA512e7f5c986925d65beee650c25cbda89ca85abbf07f1e949b92962f1d8ab5913a771ad9f7243b9a2b5ddd98d08bdaf53055b3c9e68b199c7d793388bdbe54ec84b