Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 23:31
Behavioral task
behavioral1
Sample
ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe
Resource
win7-20240903-en
General
-
Target
ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe
-
Size
92KB
-
MD5
fc6d20184221e54e05c2b331755ed850
-
SHA1
a8f8a5d37d9598cf08286d55199da6135d6d3f1e
-
SHA256
ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88
-
SHA512
e7eba10f0af0d2e96ef928e91e5497769370446f999783415c6c1e6963591b740dce47a52633511baf03605d11392b13bbf281dac5fe107433268982c892e132
-
SSDEEP
1536:Pd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5d:ndseIOyEZEyFjEOFqTiQm5l/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2732 omsecor.exe 2076 omsecor.exe 1524 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2228 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 2228 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 2732 omsecor.exe 2732 omsecor.exe 2076 omsecor.exe 2076 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2732 2228 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 30 PID 2228 wrote to memory of 2732 2228 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 30 PID 2228 wrote to memory of 2732 2228 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 30 PID 2228 wrote to memory of 2732 2228 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 30 PID 2732 wrote to memory of 2076 2732 omsecor.exe 33 PID 2732 wrote to memory of 2076 2732 omsecor.exe 33 PID 2732 wrote to memory of 2076 2732 omsecor.exe 33 PID 2732 wrote to memory of 2076 2732 omsecor.exe 33 PID 2076 wrote to memory of 1524 2076 omsecor.exe 34 PID 2076 wrote to memory of 1524 2076 omsecor.exe 34 PID 2076 wrote to memory of 1524 2076 omsecor.exe 34 PID 2076 wrote to memory of 1524 2076 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe"C:\Users\Admin\AppData\Local\Temp\ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ecee38176c07d0a24a1021c3224673bf
SHA161605f34159cfe3dda30407cecd28797781ae162
SHA2562c8b81b810ffd5e755a86102d5477ac1cd5cd47886e1f0c0270f0b436620d743
SHA51239d0998be22b4c7e659833b2abddc07c2983d7757a003ecb0b30701f55a6aaca56c0e0cd1924423c0d34acdd0294aa6c9e58005f752d8f3c49d3c665fd267a6f
-
Filesize
92KB
MD54a22b9e904a4c5c8ea8757473a1aba1b
SHA1ad81acba16906898306ef2c6d09e2e2877233f05
SHA2569f18bb1ea3793141da52c129c143cf745aea00531f981f636a0ce0bdaf1601d7
SHA51201cb8a771fc967010a8a956a047578df179307ff9d5c1d21af59969d997b4261e8b9f0b03f8316edfdf87f65ac6ef5d09707922aa112d0d3c5ed41680248cb5c
-
Filesize
92KB
MD53252d8bc05f7952f90345a44872e5d53
SHA14639968e3663c5c5b17601dfd5cc2ae0ea24e966
SHA256d9ed67054ebedb8ff554d07743c895ae823d915768b6ac7ebb08dec2ce38f007
SHA512ff6c8660fcc32319c08824a96af0d923633a74b147c0947b38c7e5d542e0644f155306a217a76c15532f6af94b0f4b062b9c0fbb3b45f6962552df182b7b6ec0