Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 04:25
Behavioral task
behavioral1
Sample
b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe
Resource
win7-20241023-en
General
-
Target
b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe
-
Size
76KB
-
MD5
45aead127cba32d28b8412ce31abf7b9
-
SHA1
86d1cb708af4cd462a2293b5157701912983f02b
-
SHA256
b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd
-
SHA512
9a39f15d0b632316cd2796217292efda138f43486f4584f0a0b5b774ad92fadfc140a9e6b10dfef06fd5dd266319deaec300a7c047344bf571a9fa47842ce636
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11L:FdseIOMEZEyFjEOFqaiQm5l/5w11L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2140 omsecor.exe 1512 omsecor.exe 1552 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2128 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 2128 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 2140 omsecor.exe 2140 omsecor.exe 1512 omsecor.exe 1512 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2140 2128 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 30 PID 2128 wrote to memory of 2140 2128 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 30 PID 2128 wrote to memory of 2140 2128 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 30 PID 2128 wrote to memory of 2140 2128 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 30 PID 2140 wrote to memory of 1512 2140 omsecor.exe 33 PID 2140 wrote to memory of 1512 2140 omsecor.exe 33 PID 2140 wrote to memory of 1512 2140 omsecor.exe 33 PID 2140 wrote to memory of 1512 2140 omsecor.exe 33 PID 1512 wrote to memory of 1552 1512 omsecor.exe 34 PID 1512 wrote to memory of 1552 1512 omsecor.exe 34 PID 1512 wrote to memory of 1552 1512 omsecor.exe 34 PID 1512 wrote to memory of 1552 1512 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe"C:\Users\Admin\AppData\Local\Temp\b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD54b6fc7b37282d691039c338ed150f544
SHA1f20ad852c5e80002fa4b0b597b2c2faea0dfb99b
SHA256b7ab9440fe5abec012fedf2062374452b2e0afaceaf7974de8319e24edd12cbb
SHA512e898e75840c2db8555d622ccc8153398a8d79b711c432692322f557f2a2e74a64071aedf99d0a5d27a432fee6167f0b36ba8777a5d41d15de85363665452261c
-
Filesize
76KB
MD52fd73d5036c1fd71a51ece1941326c0a
SHA109696bbe91be11f6db2a2a414001f714f8e9cfd8
SHA2563bcaaff9bb14f0e01eda05368ac826b31a817a6765ec9a6a291ec0b31882d326
SHA512e7747fb83b00f785c1dc3b4d9a5e3217fd87d2d791c4f379ba4598585181265676026bdc017a58fe138ffa27bbad2b0f13cc5fcbf3f5fb51d73535bc13c7e59c
-
Filesize
76KB
MD56e4db286990bbbdcddde2f9d07c8ae51
SHA1e673e713555b1a5492015babe38ac543c9cfc070
SHA2561991adaf5777a65a3e7d701aa345666646962d973b116537b27907d8f0a21b28
SHA512da1a8be891f68287ba3f66eec551569cdb48ab69202461f58e858bec62c21910cab1772e5a9b853d68a9ea0325a7f29161c51756c809efd7c64ffe9af259666e