Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 01:42
Behavioral task
behavioral1
Sample
83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe
Resource
win7-20240903-en
General
-
Target
83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe
-
Size
72KB
-
MD5
e3caa2b64811f56d18ec442b55783d93
-
SHA1
25898cde48ad3d96d029b7d16a0110334686b8aa
-
SHA256
83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4
-
SHA512
a4e6274a5d2fdfd7de1e56c35fed12deb9800c8f1e61c57b0024bcd84f9e5bcc0d1f2571d22640efc67fd42f83feb15cfe92e8c39f27a35bd3810525541d7a7a
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211/:DdseIOMEZEyFjEOFqTiQm5l/5211/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2060 omsecor.exe 1868 omsecor.exe 2828 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1044 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 1044 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 2060 omsecor.exe 2060 omsecor.exe 1868 omsecor.exe 1868 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2060 1044 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 28 PID 1044 wrote to memory of 2060 1044 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 28 PID 1044 wrote to memory of 2060 1044 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 28 PID 1044 wrote to memory of 2060 1044 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 28 PID 2060 wrote to memory of 1868 2060 omsecor.exe 32 PID 2060 wrote to memory of 1868 2060 omsecor.exe 32 PID 2060 wrote to memory of 1868 2060 omsecor.exe 32 PID 2060 wrote to memory of 1868 2060 omsecor.exe 32 PID 1868 wrote to memory of 2828 1868 omsecor.exe 33 PID 1868 wrote to memory of 2828 1868 omsecor.exe 33 PID 1868 wrote to memory of 2828 1868 omsecor.exe 33 PID 1868 wrote to memory of 2828 1868 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe"C:\Users\Admin\AppData\Local\Temp\83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD59e3c45541180556f2d05eb251d0d5fff
SHA19a54eb8c08789a0fb6311daa05796568fc6a5241
SHA256d1c03a711f6afe08c536825a6467c6affb77527be88a1c682ece305be670423d
SHA512d3f2fee86f1271fdff48c8912ce0158614c515f447f874478709fd5c96e92c443ec9f0c779c0269bed1058f064a4250f220fdd6d5f54415e37da8f1fde63912e
-
Filesize
72KB
MD5033cb40b603cbfe5841ac82edbb51399
SHA15e196d0a334abfe7ae6ab1626fd203994f2b80e6
SHA2561f3b82af525b60fed2c4f1cf4b9ffcd12c795ffb8816bdf49cfe79a78af885f7
SHA51231f4aa2182b896a944dc172563fe28888861a9e2132c6a09153d28defc08b8bae2dcdc6a4ea347151511dc3a4e17a758bbf0c98842ee9d165af8f39dfab9b07c
-
Filesize
72KB
MD51b0c45fbb19433c2086d8f63573c3332
SHA1300631eb769d13a2e80325b8728933db6837f3af
SHA2566cf48ab16a25740b6df54770859883f9eec2ea89eb4db04dfa0cebc289b90073
SHA51222855ac7b0357266d234680c6fc76559487fa298ef354e2a18e32c476a39412ebc8b87aaae1075bb9513cdb6803032483f03cdb5f5e4e6acdd5837d61b2a8c36