Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 12:32
Behavioral task
behavioral1
Sample
d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe
Resource
win7-20240903-en
General
-
Target
d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe
-
Size
71KB
-
MD5
19b264530ebd88a4daa31dfde236dfb0
-
SHA1
77ca31c073d38dddd69c7285e03af799943c5459
-
SHA256
d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6
-
SHA512
1591692d119663c9d69388405884e98b8957fdb16391b6939565035d1174dcf1d187769acfbabb970578ee2bf83583e9ef1d8ae6d486a1ac6a236deef7d4c469
-
SSDEEP
1536:0d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHP:MdseIOMEZEyFjEOFqTiQmQDHIbHP
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2916 omsecor.exe 112 omsecor.exe 840 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2428 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 2428 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 2916 omsecor.exe 2916 omsecor.exe 112 omsecor.exe 112 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2916 2428 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 28 PID 2428 wrote to memory of 2916 2428 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 28 PID 2428 wrote to memory of 2916 2428 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 28 PID 2428 wrote to memory of 2916 2428 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 28 PID 2916 wrote to memory of 112 2916 omsecor.exe 32 PID 2916 wrote to memory of 112 2916 omsecor.exe 32 PID 2916 wrote to memory of 112 2916 omsecor.exe 32 PID 2916 wrote to memory of 112 2916 omsecor.exe 32 PID 112 wrote to memory of 840 112 omsecor.exe 33 PID 112 wrote to memory of 840 112 omsecor.exe 33 PID 112 wrote to memory of 840 112 omsecor.exe 33 PID 112 wrote to memory of 840 112 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe"C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5928f6081f6f7c37985eeeea6d7dbdbf3
SHA126d893ba535035dd88ec535b4ffd1a0338d906a4
SHA25671654e22d208d6aa238834a6f218c5e2c15758eae10277c39314c124ffa95e5c
SHA51250a54ba9ae8fe9ab48c07ed34d507214c27e64ca0d129ce14fb4ba2c002412d82a7404619328033196b5c2b348f69e734500b1aea4b9e00d6f2cae193daeda0d
-
Filesize
71KB
MD58686ea52a74216cf4f245e61119f092e
SHA1a88c66e8ffb852e2f9a8990e6f573bf8b16d9b81
SHA256422f477c978d15a2cf3b55ee29a32b6135891b08560111f2ede7c3924186aa3f
SHA5129075c6838b362b8d2798c53f18a6fc719fa925cb0374ef3b951f5954267303534534749198d494b2be067a7d87b9c32fbf86d903120e6d277051d91227f7a6e9
-
Filesize
71KB
MD5e2ca68d185c8ea2e850c261e808f739b
SHA1ec648fce84d0f3ec06e8c3222daf487ecd0b5916
SHA256ffc6a978ac08df5bdcf6217bb52a4e17bd210828351f2216f01d68b3a61251bb
SHA51267ae3ab9a70c0b1fb66f338103ac62269e87397bdf2a5e20afba7d91b2cd3c862dfd39bbbeee5e93bda1915741dd1165284902b2934b46ce1f314512ca2b8076