Analysis
-
max time kernel
104s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 19:19
Behavioral task
behavioral1
Sample
7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe
Resource
win7-20241010-en
General
-
Target
7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe
-
Size
92KB
-
MD5
4784d24e7702d3f138144ebd01378e67
-
SHA1
19b65f309de690d9768613c75f83c821f76ee969
-
SHA256
7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558
-
SHA512
9ad021ef5b624517aadd986df2783bef2edc444a0a17b63423e421bba640c88f3d3bc8040d5ba124ae843e851f9b9090e2cd5d5338e981246e9f72a2672f4150
-
SSDEEP
1536:Vd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5H:ddseIOyEZEyFjEOFqTiQm5l/5H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2364 omsecor.exe 2664 omsecor.exe 1496 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1628 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe 1628 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe 2364 omsecor.exe 2364 omsecor.exe 2664 omsecor.exe 2664 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2364 1628 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe 30 PID 1628 wrote to memory of 2364 1628 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe 30 PID 1628 wrote to memory of 2364 1628 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe 30 PID 1628 wrote to memory of 2364 1628 7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe 30 PID 2364 wrote to memory of 2664 2364 omsecor.exe 33 PID 2364 wrote to memory of 2664 2364 omsecor.exe 33 PID 2364 wrote to memory of 2664 2364 omsecor.exe 33 PID 2364 wrote to memory of 2664 2364 omsecor.exe 33 PID 2664 wrote to memory of 1496 2664 omsecor.exe 34 PID 2664 wrote to memory of 1496 2664 omsecor.exe 34 PID 2664 wrote to memory of 1496 2664 omsecor.exe 34 PID 2664 wrote to memory of 1496 2664 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe"C:\Users\Admin\AppData\Local\Temp\7228750f5a6cb070088f78ba50a24c0bb7f9507ab60931826ae5fd8b548d0558.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1496
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD51eb3472ab43d96b0945e73b718affae7
SHA1783f27b5478aa7af880d5b0856aaf65825e6c70f
SHA25611a9a3884332706c621660cdd9bc5ce37bcb2ee8633b57ba9b65d6bdc4b990f8
SHA51294fb29391d874dc0e7100f4460012f6cd414a36f4d8a93b4f5d93c72f5363629f935b0c40955bf17aa8e80f56746e6b80537ad31fc019c1ab30fa34be3dec378
-
Filesize
92KB
MD5e2d2ee381f546498b90bbc1646d4281c
SHA13f192846434a2b2bfd08f60018ebfcba4e30ef8c
SHA256bd7860622cb4bd70b8ae338578648c4f922b87967d73572c15e08dc760a97f59
SHA512b6eacfe46be49a49f65df31ae414c14a4e7e9da218b23a69e0667abf2e6d65fc86f6ec53268f52029cd225bbba856e00303ec2dd934e0e9e34d0a0a5bdd34e5a
-
Filesize
92KB
MD56fcfd203b4a45e53887116f9f9f4b0f0
SHA19981f88b3aafb82b0c2e893225ca2f877f701579
SHA2560fd02634dfdb98a6f45c9eba267fa86fc9dd781efa49cff7a475e6df7c73fab1
SHA5129559fae6c017417bd02a516ebaa5dce904304b561e8009d1a45b20bd807f46d26dd8949d9bbe642a362d80dd888ce675eada07ebd4bb7fbaa135aec1dcef9beb