Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 02:42
Behavioral task
behavioral1
Sample
8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe
Resource
win7-20240903-en
General
-
Target
8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe
-
Size
92KB
-
MD5
c787be34fed9da0b7e0cc61ffb5491b0
-
SHA1
91a99a52693ae79932866f7e13c28c627669bb53
-
SHA256
8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9
-
SHA512
5bbf2274912ae12e6191bb4a5434438a5f84cbaf8e06977407a1426de2ac5bb4a1753bcacbe47ee44da183010d3f629b7dae906301bbafbcf1fdc5401c9d7c6b
-
SSDEEP
1536:Vd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5f:ddseIOyEZEyFjEOFqTiQm5l/5f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1692 omsecor.exe 2740 omsecor.exe 1332 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2372 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe 2372 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe 1692 omsecor.exe 1692 omsecor.exe 2740 omsecor.exe 2740 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1692 2372 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe 30 PID 2372 wrote to memory of 1692 2372 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe 30 PID 2372 wrote to memory of 1692 2372 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe 30 PID 2372 wrote to memory of 1692 2372 8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe 30 PID 1692 wrote to memory of 2740 1692 omsecor.exe 33 PID 1692 wrote to memory of 2740 1692 omsecor.exe 33 PID 1692 wrote to memory of 2740 1692 omsecor.exe 33 PID 1692 wrote to memory of 2740 1692 omsecor.exe 33 PID 2740 wrote to memory of 1332 2740 omsecor.exe 34 PID 2740 wrote to memory of 1332 2740 omsecor.exe 34 PID 2740 wrote to memory of 1332 2740 omsecor.exe 34 PID 2740 wrote to memory of 1332 2740 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe"C:\Users\Admin\AppData\Local\Temp\8b8afce48da1552e0d3315b8e9166ec9625504971e2efaa740dee78587b1a1e9N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD56156a874680b83f66bb4ae74e59c5bc2
SHA1fcbc055b5c57025cfa7acf0310d386c6d0a79c92
SHA25623332e19aab915072c6ea6ff412edbd377711528c619bbec78589c45048f099a
SHA5123683499583b778827229360d11dc4fd148165df63acabcf51340c308d6f4af6bf2ec43ff3bf2d786b3a308266e509eb4518b065d4e882bdea0f0612fa3e91e20
-
Filesize
92KB
MD56223eb31dc6bf2082c93281ad5a0e0b4
SHA1e46e7ef2a9a2b060487be2c9b949d0ad3a5c352a
SHA25665fd499bc62eaab8aa774c39d621e878c842daa8a821be022b8054558f06d8b0
SHA512eba8b58cc8292ddc0e5f1f2e5c07500ce634fb3c2688230cba9639cec2c883f05cbee105bda112ef030275827d3083e27ec7d20bb3e3077e31a3a2f1e1d24dd3
-
Filesize
92KB
MD51ebf150456a311b1dc3e7be875ad1dfb
SHA158dc6f1759193a092d0d332f0af9fd0851fa92ab
SHA25694442f615cef9ee6151aee805f1e6874b06ea4a49b2e355c022c97c448b4946a
SHA512e88f9b4fd045fa7967bdb27261e485540f596feef3cae2d25ee2a1ba83944301b3afb4e1c1410503afd73ec51f4d9a45b1ecd2077ed146439e95ec8abae6945c