Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 19:15
Behavioral task
behavioral1
Sample
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe
Resource
win7-20240903-en
General
-
Target
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe
-
Size
92KB
-
MD5
2be30265d272f74f1aca2612f0684f54
-
SHA1
a36210ff240468e9f2cc25a5848689629c917e83
-
SHA256
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033
-
SHA512
645594d199256ebc93cd344a915d29b2fef503abe3ca2e8acedb7386a14b08ff4cc44dd4c0dc25c4de5867e742c8b935ea2ce76b6b4808873958c639ef40a2d7
-
SSDEEP
1536:Xd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5d:fdseIOyEZEyFjEOFqTiQm5l/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1808 omsecor.exe 2264 omsecor.exe 1464 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2380 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 2380 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 1808 omsecor.exe 1808 omsecor.exe 2264 omsecor.exe 2264 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1808 2380 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 2380 wrote to memory of 1808 2380 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 2380 wrote to memory of 1808 2380 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 2380 wrote to memory of 1808 2380 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 30 PID 1808 wrote to memory of 2264 1808 omsecor.exe 33 PID 1808 wrote to memory of 2264 1808 omsecor.exe 33 PID 1808 wrote to memory of 2264 1808 omsecor.exe 33 PID 1808 wrote to memory of 2264 1808 omsecor.exe 33 PID 2264 wrote to memory of 1464 2264 omsecor.exe 34 PID 2264 wrote to memory of 1464 2264 omsecor.exe 34 PID 2264 wrote to memory of 1464 2264 omsecor.exe 34 PID 2264 wrote to memory of 1464 2264 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe"C:\Users\Admin\AppData\Local\Temp\015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ba65bb96fddb219e2d3a4c102a0004af
SHA1c472ba2226537accd3e2f18d05204216dc4d7db1
SHA256eeb135b02a840d285641fe3bfa1f188c1e7c11d8d75c3b0516e52587a45bf13e
SHA512a5764c6ae9ad2fad0b7afb5e58a16fd3f7cba73dfea53428a54ee86e413f1bd1a64a9d05a090f1e12c9aeb772a3af707966c0419f42c9caf7aedd92a1f73b9a1
-
Filesize
92KB
MD52131eed1f2f9f17d7a5618a39ab1db3d
SHA11aeefb85addd91ae3216904c6894de40b835e0aa
SHA2563043022bbe02bcc4a4fe4b28ab667d0db6ffa7ea8b8f436700fee969a8b64574
SHA512caa8f4810d9f36db9f3b3cd28e428a00f7a2c528b39bc37aa056d366cbfc7ce247996bdd87522d0806852a34afbb8c5660b67c8f140861604db8989b9be8e300
-
Filesize
92KB
MD5665e3c3458555d20e19706e4a1e99fff
SHA1b111ab27697ff3601a8d544cff3297774c528662
SHA25663012538875b6ffc9a807b784275bd84dd6e527c049e2f4302d23d025ed1cb54
SHA51216636d991d60b1b7533f8a6e6e34ec5d873fb0923fea7605f1f9bb052136a7ca86dd15eb4856ab548d2affe439643a1aaa26cc53656c6df36600ca590d4db78c