Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 06:01
Behavioral task
behavioral1
Sample
00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe
Resource
win7-20240708-en
General
-
Target
00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe
-
Size
80KB
-
MD5
50364cbcb35131975258fd8d772c8430
-
SHA1
0781f40b409e2e09bd5a8cae52d659ac5fb55534
-
SHA256
00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9
-
SHA512
8fc1aa4c26cbe873284cdbf45d87d13e7d9646c028671d91289fe55952ac087c2469a61595bcd447211ba4bb55b05624d43d916931414b30da5246939d2c196b
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:TdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 292 omsecor.exe 2560 omsecor.exe 2956 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1820 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 1820 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 292 omsecor.exe 292 omsecor.exe 2560 omsecor.exe 2560 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1820 wrote to memory of 292 1820 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 28 PID 1820 wrote to memory of 292 1820 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 28 PID 1820 wrote to memory of 292 1820 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 28 PID 1820 wrote to memory of 292 1820 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 28 PID 292 wrote to memory of 2560 292 omsecor.exe 32 PID 292 wrote to memory of 2560 292 omsecor.exe 32 PID 292 wrote to memory of 2560 292 omsecor.exe 32 PID 292 wrote to memory of 2560 292 omsecor.exe 32 PID 2560 wrote to memory of 2956 2560 omsecor.exe 33 PID 2560 wrote to memory of 2956 2560 omsecor.exe 33 PID 2560 wrote to memory of 2956 2560 omsecor.exe 33 PID 2560 wrote to memory of 2956 2560 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe"C:\Users\Admin\AppData\Local\Temp\00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD530b151ee9b1f8e0ba28b6a1a1686da14
SHA1a0e2ea29361dbb58f32d429db1adb17d9cd6212b
SHA256b1f559f066a2a9e0f5cc40335996da20e515e8f859e7066d35663462a9c5a222
SHA5122815e4c9bc0dac855bdcdc7cab6351aeafd7131de5408cafcd8a09aaca00dbae8f39d15cf78738c1889805777e6ae1fdca123953dc62d9477d43062194655f54
-
Filesize
80KB
MD59db2ab2b39108a52f69647fd538d627e
SHA18bf868b6373dcf9348a6a3eb09ffa8edfca32949
SHA256645665ef4a282c2ad4505edec19ed8d1794421a12d9663a36d82a6dc143bae67
SHA512a04719a0f51b0efd34f9fbd6392a274bf353e749912d224ce49d95f3dca4b4539036999a43980bc8304ba865fbcba71d7d6bd7dc9237a02776ef92a39cb6bad5
-
Filesize
80KB
MD565ef4d2638f57c488460d66446526562
SHA1e28a3496353344b56f0f8ecc9935fff3558f0543
SHA2566938c204d78c97283afccb38b166b290e029c3eb93c2816ed73e1762b51b81c5
SHA5121ec0accca334843f9d20fb20477be7c90df26b133f93c66fa30eb2f60b9b41910a744ca08ac6183afe30ea6b34fa48bd51618a3fbadbe5b1cc16faaada82512c