Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 23:25
Behavioral task
behavioral1
Sample
958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe
Resource
win7-20241010-en
General
-
Target
958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe
-
Size
80KB
-
MD5
d7ee3342e8fb2ff91b43d8273eb65f00
-
SHA1
b274578007da1aba93a09eb6332e2f9803bc3cb1
-
SHA256
958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5be
-
SHA512
b98f73b23aeb657ae774a66a4f76a4cb8682f2f9a13c3c830cb536eb9955bebb8e097dbdc6be4e596094400bf5cbd04589882399612b79e35e18ebc41dbb3b5b
-
SSDEEP
768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:6fbIvYvZEyFKF6N4yS+AQmZTl/5S
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3064 omsecor.exe 1756 omsecor.exe 3012 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2124 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe 2124 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe 3064 omsecor.exe 3064 omsecor.exe 1756 omsecor.exe 1756 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2124 wrote to memory of 3064 2124 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe 30 PID 2124 wrote to memory of 3064 2124 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe 30 PID 2124 wrote to memory of 3064 2124 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe 30 PID 2124 wrote to memory of 3064 2124 958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe 30 PID 3064 wrote to memory of 1756 3064 omsecor.exe 32 PID 3064 wrote to memory of 1756 3064 omsecor.exe 32 PID 3064 wrote to memory of 1756 3064 omsecor.exe 32 PID 3064 wrote to memory of 1756 3064 omsecor.exe 32 PID 1756 wrote to memory of 3012 1756 omsecor.exe 33 PID 1756 wrote to memory of 3012 1756 omsecor.exe 33 PID 1756 wrote to memory of 3012 1756 omsecor.exe 33 PID 1756 wrote to memory of 3012 1756 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe"C:\Users\Admin\AppData\Local\Temp\958ec3fb87126ca4ed9bf1a920231d345682456c5dc084b235fb23a04893b5beN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD58fba48e136fd08199340906833e0a843
SHA1f092125aa39fa2e459dda575924d54351c1638ab
SHA25686a8634b4b8b2e04f6aa189c1f8bbff2df56691c80528480d9eca4021b9bfd5a
SHA512998775cfa23ac14090b34abcf822d1aa47ed8e904d92dfc682fc11d59ed47773db116686ea3ad4d4b6bf7f8edd331914c1ee6a737d9089112ca5719dff9b4a73
-
Filesize
80KB
MD5f05975f1b0b9103ff8487fc2926f404e
SHA1fc75f619e997a9602278cf06b9de6beb4e5ca9d8
SHA256f60c2ceff56299d244b7dec4e40a35f6b25d2cf9dadb915432c6692015af4348
SHA512baa344b3c6fb2a2a27423f48d6984b0b3c7f7a3ec722b61e2bacaf64a2bf618c057103fcb6ce50232c7f5c03c120588acbe00e8bb98eec8a72869536e90f330e
-
Filesize
80KB
MD5dbc0129fdee1ebbd4778668431c9ebe4
SHA1dac8eec8c19c6ce12cb032282d28ae571fdd9e9c
SHA256077a78fede4eb9e50d508a82238b7b28e0846ed5820b2815644e70535b824646
SHA5121ff14c66da4ec7b79270c85d91826a0ac36f1d3c8773d27e428fc72939e5acda6e15b8487b61a2ca0955d6853cd6cb6502c502cee74bfcd3f559594b886148ef