Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/01/2025, 19:06
Behavioral task
behavioral1
Sample
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe
Resource
win7-20240903-en
General
-
Target
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe
-
Size
92KB
-
MD5
2be30265d272f74f1aca2612f0684f54
-
SHA1
a36210ff240468e9f2cc25a5848689629c917e83
-
SHA256
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033
-
SHA512
645594d199256ebc93cd344a915d29b2fef503abe3ca2e8acedb7386a14b08ff4cc44dd4c0dc25c4de5867e742c8b935ea2ce76b6b4808873958c639ef40a2d7
-
SSDEEP
1536:Xd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5d:fdseIOyEZEyFjEOFqTiQm5l/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1548 omsecor.exe 2264 omsecor.exe 1744 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2436 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 2436 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 1548 omsecor.exe 1548 omsecor.exe 2264 omsecor.exe 2264 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1548 2436 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 2436 wrote to memory of 1548 2436 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 2436 wrote to memory of 1548 2436 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 2436 wrote to memory of 1548 2436 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 1548 wrote to memory of 2264 1548 omsecor.exe 33 PID 1548 wrote to memory of 2264 1548 omsecor.exe 33 PID 1548 wrote to memory of 2264 1548 omsecor.exe 33 PID 1548 wrote to memory of 2264 1548 omsecor.exe 33 PID 2264 wrote to memory of 1744 2264 omsecor.exe 34 PID 2264 wrote to memory of 1744 2264 omsecor.exe 34 PID 2264 wrote to memory of 1744 2264 omsecor.exe 34 PID 2264 wrote to memory of 1744 2264 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe"C:\Users\Admin\AppData\Local\Temp\015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ba65bb96fddb219e2d3a4c102a0004af
SHA1c472ba2226537accd3e2f18d05204216dc4d7db1
SHA256eeb135b02a840d285641fe3bfa1f188c1e7c11d8d75c3b0516e52587a45bf13e
SHA512a5764c6ae9ad2fad0b7afb5e58a16fd3f7cba73dfea53428a54ee86e413f1bd1a64a9d05a090f1e12c9aeb772a3af707966c0419f42c9caf7aedd92a1f73b9a1
-
Filesize
92KB
MD52ce9d6892581ce67aa5e4dcad58cd890
SHA14a561a72834f07d8dba52e10cebb298ca4f47f2c
SHA2569d2424050ac89aa41f96f5fe89a3e8e79e2fadfec751f1d82373f5f64782dbfb
SHA51227c46ee81528a11caf41de9d331b0898f58f8083258b8946cd89398f11d74320fa2b29dfb7ec6413256248db527dc9f9b70b92a8a3f6513081c71d215f5cc83a
-
Filesize
92KB
MD5e5f88493d7ddc8f00294b91429d5283f
SHA1d4a5effc62c78cd5791743f3289c2b1e51f32f83
SHA256027cafc4e00672470f6175922b369ad7edbd749490ede652d011bfb36f33754f
SHA5121aa19298c3180d8be2bc03e8ba96993e77bc05587538e344e00dce0861eb78f39aa8d8145a319a3654be14a6c4cc2e0904d02d1758a0d7468bf9df085cd9b395