Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 21:27
Behavioral task
behavioral1
Sample
1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe
Resource
win7-20241010-en
General
-
Target
1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe
-
Size
71KB
-
MD5
04f6650d9b17bcc0c0409cf712c6b0e5
-
SHA1
7753d3937251fb6b657fae9eb7efe221e3057a5d
-
SHA256
1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669
-
SHA512
bc7c7decc774484c3d59513e85e181287efeae2fe2b22ee45b3b85961a03957fb762928e07385d786a71c5945e2b46bccc2f1c574cc1c6ee2a92f18f68b2e564
-
SSDEEP
1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHV:XdseIOMEZEyFjEOFqTiQmQDHIbHV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2364 omsecor.exe 2996 omsecor.exe 2740 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1740 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 1740 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 2364 omsecor.exe 2364 omsecor.exe 2996 omsecor.exe 2996 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2364 1740 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 30 PID 1740 wrote to memory of 2364 1740 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 30 PID 1740 wrote to memory of 2364 1740 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 30 PID 1740 wrote to memory of 2364 1740 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 30 PID 2364 wrote to memory of 2996 2364 omsecor.exe 33 PID 2364 wrote to memory of 2996 2364 omsecor.exe 33 PID 2364 wrote to memory of 2996 2364 omsecor.exe 33 PID 2364 wrote to memory of 2996 2364 omsecor.exe 33 PID 2996 wrote to memory of 2740 2996 omsecor.exe 34 PID 2996 wrote to memory of 2740 2996 omsecor.exe 34 PID 2996 wrote to memory of 2740 2996 omsecor.exe 34 PID 2996 wrote to memory of 2740 2996 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe"C:\Users\Admin\AppData\Local\Temp\1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59543c45a106cc2aecb703a8e4e944826
SHA1ee4807bb2d01fb9277609da329de7e0481a22501
SHA256c69a99fcd240811ce7d5027e24e39d48257bd9f9063b4e164eae544d546f9f8b
SHA51277d75a0413e40a98affe5b73fcac617d38ba8013979f463e2d0b6e3a64428a2215cf7220777834d945aa4c459a6d7e1a67ed496755f562fbdc167f60c9ebfd1e
-
Filesize
71KB
MD5ec998c1fde6df825989863ffa44461c8
SHA1c1845099ae5329712392b6fb9310381ab41c74ff
SHA2569fc856803f5474f7eb1ddab036f0d5a885704fd1492ceedf4b8c800efd4a1119
SHA51238e44548073b81bebbd1cf9f4d2fbeec8a9ba5d90a327c3bf0ccf43431a34cd7d0c1483169bcfaa0302eadace8cc75aebae344d59eba6f21a25ff6f3a9f0baa0
-
Filesize
71KB
MD54be50df3892ea72abb22811f1a9932bb
SHA13c5b6b53b5389459a6bffaa532af6b956fdfc845
SHA256572b0ebbced01501759d85b710fd69a7355e90350c718d240a087a021b142b90
SHA5123e33daef38dc436407a09b38f102f04615972149cb2f8d8f382fbc31fa0e949245aba20e5f74da5b9a3b0db02d78aaa50dadc69e61a0460316b9b8c9dd7a318a