Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/01/2025, 08:55
Behavioral task
behavioral1
Sample
5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe
Resource
win7-20240903-en
General
-
Target
5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe
-
Size
80KB
-
MD5
05fb1bd5a07f2af2f887d2d050bc7150
-
SHA1
95d4377c79e2807bcb0429c3140280908cdef99b
-
SHA256
5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086
-
SHA512
cbc9344f723abffda13c6be833e6597a8b24721f73792a322ff9a7c5f3a5425528f94ce9db71dd63d38181441a3e958160a2ac05bc53ad05ceca0776a65144cb
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:edseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2128 omsecor.exe 1328 omsecor.exe 1752 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1548 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 1548 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 2128 omsecor.exe 2128 omsecor.exe 1328 omsecor.exe 1328 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2128 1548 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 31 PID 1548 wrote to memory of 2128 1548 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 31 PID 1548 wrote to memory of 2128 1548 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 31 PID 1548 wrote to memory of 2128 1548 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 31 PID 2128 wrote to memory of 1328 2128 omsecor.exe 33 PID 2128 wrote to memory of 1328 2128 omsecor.exe 33 PID 2128 wrote to memory of 1328 2128 omsecor.exe 33 PID 2128 wrote to memory of 1328 2128 omsecor.exe 33 PID 1328 wrote to memory of 1752 1328 omsecor.exe 34 PID 1328 wrote to memory of 1752 1328 omsecor.exe 34 PID 1328 wrote to memory of 1752 1328 omsecor.exe 34 PID 1328 wrote to memory of 1752 1328 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe"C:\Users\Admin\AppData\Local\Temp\5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5731d6eef7259abb4eaa260f17da2e800
SHA1b06e146cc55a7b3a16d098fa2104137b32188106
SHA256008608aa8614bd3a5c256355e47a0781ae01fd3d14812fa4be526c26352c1870
SHA512b12e638a7b34915a048470ea2216191f535acb6e896a71341077dcf4917c58ce1018bf2813ecc57f7ed9f09d3112a9a43f394b9dfdeb7c5d4d2b78e6ae464400
-
Filesize
80KB
MD56bada2b841fb090976ba32f4b8476519
SHA162cec480147a18fc3f76310981b3527a81b0aae6
SHA256bf6aac463e87825aac56af0ea84d6e33e959e8046332d3e206c4870831b6598f
SHA512ccc33b520601b6b13255353a8ed0c0d429d2db43f4af050e8ea3ac511c26fb53772d5cb27490dbf844726f6dd3b67d9579651b71f1f3347fd601b3d8e31a479f
-
Filesize
80KB
MD57b634a4bf54af6775080bd0ab30ac601
SHA1202dbcfb59639fc64ed7781799e321bda6436fb0
SHA256b5207e04e6a7445e564d3d1fd2065938959facefa95f87279fce2227ca0818bd
SHA512c3edf10032af5241f753643fdc850a7f6dc92dfdbb5bd3c7665dec4c21db59620f4a66fb477f594c2488ec7c18ec97b285f3686d56f79a9f6234af0887b7aee7