Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 16:52
Static task
static1
Behavioral task
behavioral1
Sample
5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe
Resource
win7-20241010-en
General
-
Target
5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe
-
Size
33KB
-
MD5
043c87cf6dfe98c93427a34e7b174a60
-
SHA1
fcd7af16157e7870fe6895e3eea40b1f5533f9d9
-
SHA256
5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55
-
SHA512
0cf64ef8742eea8ae91d991361f8b66d126144b026837a23183c05956cc37a97093a0f28e58edb2b003aad9075fb92a9bea3b88a70072a1d0a495c122125ed78
-
SSDEEP
768:XfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:XfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2360 omsecor.exe 940 omsecor.exe 1456 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2572 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe 2572 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe 2360 omsecor.exe 2360 omsecor.exe 940 omsecor.exe 940 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2360 2572 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe 30 PID 2572 wrote to memory of 2360 2572 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe 30 PID 2572 wrote to memory of 2360 2572 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe 30 PID 2572 wrote to memory of 2360 2572 5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe 30 PID 2360 wrote to memory of 940 2360 omsecor.exe 33 PID 2360 wrote to memory of 940 2360 omsecor.exe 33 PID 2360 wrote to memory of 940 2360 omsecor.exe 33 PID 2360 wrote to memory of 940 2360 omsecor.exe 33 PID 940 wrote to memory of 1456 940 omsecor.exe 34 PID 940 wrote to memory of 1456 940 omsecor.exe 34 PID 940 wrote to memory of 1456 940 omsecor.exe 34 PID 940 wrote to memory of 1456 940 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe"C:\Users\Admin\AppData\Local\Temp\5777dfcdf4a1aeb13d44e73ceca5cb2f5ccd6472a8bc17f5947cb4037a517b55N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD54487a353ab7ff913bead9834c26afc89
SHA1129ebced6028fae762df3cf06a476dd46f2c8e24
SHA25664f920db31408a56f111cbc96b19231bdd848ada32549661dc0c9416f679ad50
SHA51293a09de99eecd0a89c3e7c937c787e5243b6d83ce2c9e1272f8039c9a8e7b52f03d08c0fe37d2c92b36a0251c486aff478a56a4c3411adf2e0b1f5072c551a38
-
Filesize
33KB
MD5e6a86570f4147daf1d28506c3f18641b
SHA18e19d63865424d183b08be7638fd20cf8d62bd96
SHA256bcce055de732c79b0ead8fca1133294121286c0c0717287383c8d84202f1cdc8
SHA5123a3ef872c0cfdf99777f71f6fe845258678fb1d0340dbf60379b26c554607f94728cb324e2044f519a65558c73b69c842c48dc366f9e5d0e9f93238dabdbb032
-
Filesize
33KB
MD5290e806fdbc8dc25524527fac89439d8
SHA1b09cbb2de24bda8fa2bd0bdf6569700faf6b1676
SHA2565a87a06b013f9b324104434ff7a759767b2952c7628a79c59eebb2a5ca0fc847
SHA5121263baad768346d8b67ef2da5f85c2840585676f5b6a44f2b1381cc4e954ae6ae72d21610ae207829713d6740733e805bbb28f51fd34c342ec288a3960de3f88