Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 00:25
Behavioral task
behavioral1
Sample
7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe
Resource
win7-20240729-en
General
-
Target
7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe
-
Size
90KB
-
MD5
1ae4087e15eb5000df50db515ff79745
-
SHA1
66d074bbdf7712d24d5e58e5e73b45eb5013bf46
-
SHA256
7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964
-
SHA512
a290cc9f8d72b1c3ad66022f5f767a21750c37a7b5e7996ab292add17a311908b8093de84df9358a570bfeb50571d9996759ee12c24aab92db646c242c3d7a76
-
SSDEEP
768:qMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAu:qbIvYvZEyFKF6N4aS5AQmZTl/5m
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2092 omsecor.exe 1892 omsecor.exe 784 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2264 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 2264 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 2092 omsecor.exe 2092 omsecor.exe 1892 omsecor.exe 1892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2092 2264 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 30 PID 2264 wrote to memory of 2092 2264 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 30 PID 2264 wrote to memory of 2092 2264 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 30 PID 2264 wrote to memory of 2092 2264 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 30 PID 2092 wrote to memory of 1892 2092 omsecor.exe 33 PID 2092 wrote to memory of 1892 2092 omsecor.exe 33 PID 2092 wrote to memory of 1892 2092 omsecor.exe 33 PID 2092 wrote to memory of 1892 2092 omsecor.exe 33 PID 1892 wrote to memory of 784 1892 omsecor.exe 34 PID 1892 wrote to memory of 784 1892 omsecor.exe 34 PID 1892 wrote to memory of 784 1892 omsecor.exe 34 PID 1892 wrote to memory of 784 1892 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe"C:\Users\Admin\AppData\Local\Temp\7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD540d003874f891a639b682c13379a7f3e
SHA15dad743983c37b8659c7d56c68dcf5379cf6799b
SHA2564cb5c4ed6c8eef76ba2b9f365d4e610600008b15004e76bf08060c12f5cc47e4
SHA51202b974e525fb6b36221918e6fb03e0cb4e372db4ef284d58f9e3688eedbbdf8fae175b81a960538741fb1808cb6456182d0d8821812c0bb0ddafa5e39fc55c70
-
Filesize
90KB
MD5d12b96cb784a78240ccd506eac9f36e1
SHA1281c065cc7e25a998e13028386b466b53b47db66
SHA2568cea925e85167d4e5d6e155deb6309649475222582ba1a663ef20323aca22b96
SHA512a6bc2c625f04332199ed08db2de9c06c4e551646f8c9994e230b05087b8864cb88339631d6bcea1b25054b237fa8929e27b0abd739340da426d71386c0b71999
-
Filesize
90KB
MD583f5a9f0ffbcd9522605661a7831dcc9
SHA177cc007ed56f86a52bf1fb7e14a7b8a0bf1414e2
SHA2565863a3110db9e8ccda0d286acf6a93e7b1c20912ba8ab27dcf1bb5fccbe28cae
SHA512b1192c8b9033d440f3ec5d993b9b4a29413dbc1b86dd2db0feafbc83bec59bf8d59b13cc6439dcf909822ccb518620dd0c4dc02f4fbf4c53661662a4df6df372