Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 05:44
Static task
static1
Behavioral task
behavioral1
Sample
1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe
Resource
win7-20240903-en
General
-
Target
1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe
-
Size
33KB
-
MD5
7db6c213b8b80eb3764bf9c60d7dca90
-
SHA1
e7cca96fb428933e6555416e3134b0169b2167f8
-
SHA256
1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122eb
-
SHA512
fd777d0fa627449ab029b443ccbe936c543fb2e405a62c4400356918a955191c7e0b40126e9a1f160854ba4557ad2b68c79d251d243ac0f54e9fa9bd2cf8cb8e
-
SSDEEP
768:/fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:/fVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2072 omsecor.exe 900 omsecor.exe 1860 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2164 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe 2164 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe 2072 omsecor.exe 2072 omsecor.exe 900 omsecor.exe 900 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2072 2164 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe 31 PID 2164 wrote to memory of 2072 2164 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe 31 PID 2164 wrote to memory of 2072 2164 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe 31 PID 2164 wrote to memory of 2072 2164 1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe 31 PID 2072 wrote to memory of 900 2072 omsecor.exe 34 PID 2072 wrote to memory of 900 2072 omsecor.exe 34 PID 2072 wrote to memory of 900 2072 omsecor.exe 34 PID 2072 wrote to memory of 900 2072 omsecor.exe 34 PID 900 wrote to memory of 1860 900 omsecor.exe 35 PID 900 wrote to memory of 1860 900 omsecor.exe 35 PID 900 wrote to memory of 1860 900 omsecor.exe 35 PID 900 wrote to memory of 1860 900 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe"C:\Users\Admin\AppData\Local\Temp\1885a56768f6b22bde822d77c42fabed44887a883a274d40ac8cf4b62a1122ebN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5e25c8afe4cc43c66771cbfb1a4923658
SHA1c247e35ffe3a3b91f8109c81ba6fdd49fe8256ae
SHA25606754f6f80df8a8e7580a70f9c8803d0fdf17724cd5a5d6cfaf2664f968a0cdb
SHA512c531055f0888e1ff77edd16fe7a46732d0a136eccda0fe71862a0a0a1d4a7eec6e02d8b47a370463041ffb695f48fb1cbbbb7077298aa22daf717aaa03cf95cb
-
Filesize
33KB
MD5177094dc1624194202c2a950a864f041
SHA1dbc5c8e0531a7bacf2129f8d471afca3b20ae473
SHA2562ebad9f8f2c46b1714d2860e4bdff3642389af5be85fb30ebad1c67cf461f888
SHA5121ce01cf5f461e9931ee25fb3064244801c6f9646759f9ea6655f40ad10dbad724cd2a805488120b5b7569a7c21a39510f1c9156a5dad9ed7fef03776efd7ca1c
-
Filesize
33KB
MD52f176c6c823965255d7b44f51843e065
SHA11f125161de84e8ed6fd0fc6d97a8f5e3f99f2f68
SHA256410155c51b9f97c8975a615ba6c7e88ed0d238bdcaa9d071aac42a802169262d
SHA512ddc40f05faf32a1e661300b23f8d06b68beaf656af25e19ec6b7075f918268621e0ab5a3a7f901bf3b8a08b61e8bf6c74e3d111aa985975f54b76516350bb26d