Analysis
-
max time kernel
106s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 00:49
Behavioral task
behavioral1
Sample
c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe
Resource
win7-20240903-en
General
-
Target
c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe
-
Size
72KB
-
MD5
81dffcc978e4fb925e61accb421f7ae0
-
SHA1
b9614d881fbf42c234272ba91063340f394ab7fc
-
SHA256
c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68
-
SHA512
2a81dc6a9dee27965042a800df6ee6a316398a39d06c552368a3e9b3cafb93fc9aebe4c48fe721578e4db5fcf94d63a25b312fe8a9778155e7dfbfa2a5f0f038
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211P:idseIOMEZEyFjEOFqTiQm5l/5211P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2972 omsecor.exe 2900 omsecor.exe 2636 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2648 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe 2648 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe 2972 omsecor.exe 2972 omsecor.exe 2900 omsecor.exe 2900 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2972 2648 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe 30 PID 2648 wrote to memory of 2972 2648 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe 30 PID 2648 wrote to memory of 2972 2648 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe 30 PID 2648 wrote to memory of 2972 2648 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe 30 PID 2972 wrote to memory of 2900 2972 omsecor.exe 32 PID 2972 wrote to memory of 2900 2972 omsecor.exe 32 PID 2972 wrote to memory of 2900 2972 omsecor.exe 32 PID 2972 wrote to memory of 2900 2972 omsecor.exe 32 PID 2900 wrote to memory of 2636 2900 omsecor.exe 33 PID 2900 wrote to memory of 2636 2900 omsecor.exe 33 PID 2900 wrote to memory of 2636 2900 omsecor.exe 33 PID 2900 wrote to memory of 2636 2900 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe"C:\Users\Admin\AppData\Local\Temp\c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e4ecff39bb0a9bf4f4fc37f1410c6b89
SHA1b970ada909a8515b86c74f8e4560b6c49d7ff013
SHA256cf0bb30ecebee08ea66266d75d0531d44b62227ad3d19e3dc7eef4f200d70b19
SHA512b943dc539426df4abb39887a9b48ededbf349783d0b8a0e4c6ef5894f550cf4a21fedffd2023ebd18e1a8fd9b4adb45381b0875913c4a8852a79e0282f2e225b
-
Filesize
72KB
MD53ea746e48ba6b1e7e4a89ea702a627e9
SHA16af5e53eb1b7f14de0294211d25e777629131925
SHA2562129c900993db219a4cc86cfd69277abfb0768aa7be77b7ec1e1622e862cbff2
SHA5122808e339b6fcc9282697c6e3179b132f0297bce763da25d3082a6c1ce4097d9dfb472389e426853c2529d9a437e9b47cc6cf8b01461272470e805384949ea13f
-
Filesize
72KB
MD568fdba63728c299df5aa76a13cf439ec
SHA163024986f4443b06e63471de0b8e8c401ac3250d
SHA256155a3fe69c2c7a982e16fec464fef25174e5b90638537c17ba37524c9a8aa070
SHA51237cde8610a4eb24408760d23f8e6bf84bc7398525f692570339b72f9d5a6f8743016c570373c971261a5c0fe42e649adef5c34bb6c821be83bfa763fe9f65323