Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 16:45
Static task
static1
Behavioral task
behavioral1
Sample
d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe
Resource
win7-20240903-en
General
-
Target
d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe
-
Size
33KB
-
MD5
637edd1ab9602251aa5eb253460d0500
-
SHA1
4cc41715e0ed3622e7f660c08048a520aac99d4e
-
SHA256
d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9a
-
SHA512
a3d0086d659f88a7d5753e13a0871cd0160657d6e533e7088f1725aebdbbce4d1b0179f8f9e957f2f82df8a727d9f2c6f6ec52340e1deae60be2efbe4eac17be
-
SSDEEP
768:jfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:jfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2356 omsecor.exe 2808 omsecor.exe 936 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1692 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 1692 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 2356 omsecor.exe 2356 omsecor.exe 2808 omsecor.exe 2808 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2356 1692 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 30 PID 1692 wrote to memory of 2356 1692 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 30 PID 1692 wrote to memory of 2356 1692 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 30 PID 1692 wrote to memory of 2356 1692 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 30 PID 2356 wrote to memory of 2808 2356 omsecor.exe 33 PID 2356 wrote to memory of 2808 2356 omsecor.exe 33 PID 2356 wrote to memory of 2808 2356 omsecor.exe 33 PID 2356 wrote to memory of 2808 2356 omsecor.exe 33 PID 2808 wrote to memory of 936 2808 omsecor.exe 34 PID 2808 wrote to memory of 936 2808 omsecor.exe 34 PID 2808 wrote to memory of 936 2808 omsecor.exe 34 PID 2808 wrote to memory of 936 2808 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe"C:\Users\Admin\AppData\Local\Temp\d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD596ac904076110c15101cc628317f9b50
SHA11acc2dd04d8db9532638c033143d5a6ad99de0b5
SHA256bbda20dd22724e1c05d0559ab8547606d40973ecc73bc6934d49a19624889bd0
SHA512367bf3302e05bb7cf1034311e83842cf1eaa376fa488f8626e46f5ff5b0d1a9f9cb7dd24dc9c9888842705b2dd54da127977e4b3bcac699ac89fa933e173b4a5
-
Filesize
33KB
MD56bb6f8f8e433699cd822ce4c5763fcb1
SHA1a30a7d8092819c3d0b980d025331c8ebd5188ef4
SHA256abacf0134a98a3b39705a227dd9370c881848e055e6c6d8d4e45848adbb66070
SHA512f31daedc184288fe02aeb9ed968753b90580fcf07296ef2d8ff34c56903bd99b3264db78d5ccae3ce37ce91977f5016a700565c3445b62720570ccfa6a7ba042
-
Filesize
33KB
MD5ee8688d95a22d8ed0ad58eaa2a09078d
SHA131b749814416dbcfad1d974867e85527037957e7
SHA2565890e3e6e86207a697e7711a88150d68492a4865da81ddfdf52f3d66e2dc4674
SHA512d53dc2539ee282f92c691eebed9d3d8a9f01deb8c0a55fbfd345549930972b9bd0b3a2912f51d22aa208812afd295d9cd50dc8dec0f2ba84d4861044db615eec