Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 19:22
Behavioral task
behavioral1
Sample
071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe
Resource
win7-20240903-en
General
-
Target
071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe
-
Size
71KB
-
MD5
eb2e14b5acaefa63f9c7593ccc7e4317
-
SHA1
74f9a4efcd34b590da803639d9757719d95147e2
-
SHA256
071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726
-
SHA512
753f2b39f7ccb82bfdebe362b2383ada3d3a0d68405703be1829eee3f59bcf459a1877405f75e7cb887c0c92dc3b6314d7bd2305c38d342abbf617460fffb510
-
SSDEEP
1536:Pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHf:ndseIOMEZEyFjEOFqTiQmQDHIbHf
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2292 omsecor.exe 2768 omsecor.exe 2844 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2280 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 2280 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 2292 omsecor.exe 2292 omsecor.exe 2768 omsecor.exe 2768 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2292 2280 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 28 PID 2280 wrote to memory of 2292 2280 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 28 PID 2280 wrote to memory of 2292 2280 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 28 PID 2280 wrote to memory of 2292 2280 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 28 PID 2292 wrote to memory of 2768 2292 omsecor.exe 32 PID 2292 wrote to memory of 2768 2292 omsecor.exe 32 PID 2292 wrote to memory of 2768 2292 omsecor.exe 32 PID 2292 wrote to memory of 2768 2292 omsecor.exe 32 PID 2768 wrote to memory of 2844 2768 omsecor.exe 33 PID 2768 wrote to memory of 2844 2768 omsecor.exe 33 PID 2768 wrote to memory of 2844 2768 omsecor.exe 33 PID 2768 wrote to memory of 2844 2768 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe"C:\Users\Admin\AppData\Local\Temp\071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD52bff5f4d2ebd63ddfe38037b2a5cc584
SHA160a239a0586a4bc802df5c4330661be874e5b84e
SHA2562abf589fe90b03a49dd6875d4a2827e754f3bb2daf45b0c24139ddf54f114461
SHA5123ce274d81cca879286ac73bdc7362a8585a5585cd470f5d9c4db3708eb6edf64f524f27c6631eb1f1addbfc681f678b47e0fc4a74f0b4828dc9bc3082a49cce6
-
Filesize
71KB
MD54c56382806afece25f834f45174bec53
SHA1d1508478eb102d4704c924a152407c247d4c6b7d
SHA25608cf08b5e8fdaef573dc29a936752180823dd073f7220c8f9c8acad4af9f76dc
SHA512465ed1827ecbf230c0f37b39f95f3f66a96d34fbe5f66014784d74e173cd456dac4025576bfc9581570b550a84e1b95b7a378d8230a5669b0209c52e930ecf24
-
Filesize
71KB
MD57c72e701b9b26cba575f7363de4e510b
SHA187cb7bc479dd1de193538ad00ac261578ddae63b
SHA2562c733778f2afbcdfa81ec9bf45ae68d5f4dfe643a09a2eef7cde7056419903db
SHA512985849aca60678639c950f0bcdec0d347417911db92416b7f4cfb3b8112eb06d3fce82e5cf12ae11809fdfbf8ed8a442b7361f87a05ad6b29363922e5b62682c