Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 03:58
Behavioral task
behavioral1
Sample
389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe
Resource
win7-20240903-en
General
-
Target
389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe
-
Size
90KB
-
MD5
519d867d24254fc3f17e4aa7f280d060
-
SHA1
2980ef9482ff89981063de72b4dd89feb03c9656
-
SHA256
389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6
-
SHA512
78734a35028a4ff3192a055aaf114cbf80e3468d5b2363ad15aed0e09928b2fcfb0e5e1389825ebb0c8658c33adf8381c71078f5c58ec7f653d8872e5d55c9f6
-
SSDEEP
768:qMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:qbIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2188 omsecor.exe 2324 omsecor.exe 1676 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1788 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 1788 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 2188 omsecor.exe 2188 omsecor.exe 2324 omsecor.exe 2324 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2188 1788 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 30 PID 1788 wrote to memory of 2188 1788 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 30 PID 1788 wrote to memory of 2188 1788 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 30 PID 1788 wrote to memory of 2188 1788 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 30 PID 2188 wrote to memory of 2324 2188 omsecor.exe 33 PID 2188 wrote to memory of 2324 2188 omsecor.exe 33 PID 2188 wrote to memory of 2324 2188 omsecor.exe 33 PID 2188 wrote to memory of 2324 2188 omsecor.exe 33 PID 2324 wrote to memory of 1676 2324 omsecor.exe 34 PID 2324 wrote to memory of 1676 2324 omsecor.exe 34 PID 2324 wrote to memory of 1676 2324 omsecor.exe 34 PID 2324 wrote to memory of 1676 2324 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe"C:\Users\Admin\AppData\Local\Temp\389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD559c6ecaac396fc940cb6ffd457891e9f
SHA13d41dfd0a38f7ae7b4ebad41deffd46c5a3f884a
SHA2568fca02e144bc770044d73c5a34a64914e29c65a6e02ea6e3d4f0ee3cfa49b5d2
SHA51246cf907413f5cbf980d9f931cba3468080df8ad91e2d063f3028922a1000c857288f383c824cc9f64117ca90e0c05b6ba165daae7da090f176298f9980efb1fb
-
Filesize
90KB
MD58cd99ddc52383f1e17abb6baec16edc6
SHA19a316a5ce2984135bc7d2933f7c599b63970d71b
SHA256da86dd444f8708a41ffe9d3abfe611e40720ae739bb138119b4c9b4404a0a9f8
SHA512335d18ac2c1e507656bc2b8b94a0ab486aac95ba80fe3c8bad3f84ec3c4c646a57c5b07ac53e1f63ad09d136c68148891ba2df6ee52d87a6ec8473506ce5b323
-
Filesize
90KB
MD5b36ce80e76e4ace7f2d97397d0087a91
SHA1bcb7526fdc45962325af42d243a7e5621995268e
SHA25643741f2a7050570dfe2adddebed4575e328eb556f60db297baaea09941e3c263
SHA512103ea646dcfea703e813e5802fde08dbafb0f7b586915cc3842b4babc0c1595b21161961e8ddbac30b8488046529f12abc2ec6cab83c37e62c32f6b117311b74