Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 00:16
Behavioral task
behavioral1
Sample
41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe
Resource
win7-20240903-en
General
-
Target
41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe
-
Size
72KB
-
MD5
c406fea1e86130f0e3c5818d5a9c0e90
-
SHA1
e6010de19440e71921a4b0ae9ef5a9aae8b87799
-
SHA256
41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259
-
SHA512
e348e92cd80451a84ce98320e2007462b7bf99a93289e8393142f389138522f43c1711cbf47d39956dbb1114a490095b21a946179c312bfad23f84428e552692
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/52119:DdseIOMEZEyFjEOFqTiQm5l/52119
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3000 omsecor.exe 2860 omsecor.exe 2836 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3052 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 3052 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 3000 omsecor.exe 3000 omsecor.exe 2860 omsecor.exe 2860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3000 3052 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 30 PID 3052 wrote to memory of 3000 3052 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 30 PID 3052 wrote to memory of 3000 3052 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 30 PID 3052 wrote to memory of 3000 3052 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 30 PID 3000 wrote to memory of 2860 3000 omsecor.exe 33 PID 3000 wrote to memory of 2860 3000 omsecor.exe 33 PID 3000 wrote to memory of 2860 3000 omsecor.exe 33 PID 3000 wrote to memory of 2860 3000 omsecor.exe 33 PID 2860 wrote to memory of 2836 2860 omsecor.exe 34 PID 2860 wrote to memory of 2836 2860 omsecor.exe 34 PID 2860 wrote to memory of 2836 2860 omsecor.exe 34 PID 2860 wrote to memory of 2836 2860 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe"C:\Users\Admin\AppData\Local\Temp\41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5edcdadc7cf9ebc3c93a995c6ec41fb66
SHA18bf83041951407e6758a24562730a953d3823b49
SHA2564f2bedb3f7bab41489aa00b6fd8315265c98cb19042895f875e2fb157a8cac0f
SHA51232c1730a158fba5861c161ea00a4cbf0623fe05d0ec571937e01bfbf85cb9b9bd26cd8182c0482b539f22438b22cfa0a47b069b7bd4606b2969780f64ab13c55
-
Filesize
72KB
MD5ba4b2b614c14bc3fdbbb259163f40044
SHA1b803c2e6ac8d904e9621de00b4fb705c7265b04c
SHA2561baa6327aed4050f3089413786168fa92fa662ee105f4f0d54ca40ce096f9ce6
SHA512b629d1e5a15f04062730de75a0e590db2ebe36da9e9a66260129a9550e6f9c9422efe70612bca979b5e915e8afc55d1b2feb0bc0703787764c71b154e131baba
-
Filesize
72KB
MD5d3b6b93fddbe07183a2c61cbafddc1a6
SHA1955aa157c2a5e5bd4d04773d645f4605a100a022
SHA25624fca4e87bd4da6c55ad0d463c0cbf5d1dc1ad0179e89da5b3b836e95df2033d
SHA5123916bef202764b8987d73d185de1a8727009aca19f99c12bc8f764b9d8b2a2ca15c96f4ba4a83847fc72e7e3064248a8f606ee34b38e63734af6d667291119d0