Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 09:14
Behavioral task
behavioral1
Sample
7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe
Resource
win7-20240903-en
General
-
Target
7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe
-
Size
72KB
-
MD5
da80fae1b0461aac4465d185063171e0
-
SHA1
32abec75734c86cbca19fd71112b809f9640f63e
-
SHA256
7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30
-
SHA512
276d4d2f0f2cb43c85dc7688a1182966fa3565dd30298258c43ca0ef8807f8b5e898aec15f3ee0e612c9952aa70ee446ae41aeb80c4b7f08a6e91ea124db57a1
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211F:idseIOMEZEyFjEOFqTiQm5l/5211F
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1868 omsecor.exe 1892 omsecor.exe 1932 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2340 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 2340 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 1868 omsecor.exe 1868 omsecor.exe 1892 omsecor.exe 1892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1868 2340 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 31 PID 2340 wrote to memory of 1868 2340 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 31 PID 2340 wrote to memory of 1868 2340 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 31 PID 2340 wrote to memory of 1868 2340 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 31 PID 1868 wrote to memory of 1892 1868 omsecor.exe 33 PID 1868 wrote to memory of 1892 1868 omsecor.exe 33 PID 1868 wrote to memory of 1892 1868 omsecor.exe 33 PID 1868 wrote to memory of 1892 1868 omsecor.exe 33 PID 1892 wrote to memory of 1932 1892 omsecor.exe 34 PID 1892 wrote to memory of 1932 1892 omsecor.exe 34 PID 1892 wrote to memory of 1932 1892 omsecor.exe 34 PID 1892 wrote to memory of 1932 1892 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe"C:\Users\Admin\AppData\Local\Temp\7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD576c2c1091ef316fac2979d3b1c4d61d7
SHA135a5f67107767eba1dda8928e8b202af47dc0f7a
SHA256539c1368beaefe25c0fa2fd6d76e8762387675a951fe50a0af54f06ee67fba1b
SHA512da8b1b4917bed41ee20fc64acd15c4d7057e0313d6ea9ab02bf9723439cb8f43a86ae77b4598f99f70c301b2c4b43b5dbf1248415ded0d41ab9979b96a15ac69
-
Filesize
72KB
MD512625a86cb328942302270e2d1e53737
SHA12da3a9b8ca5c6782069e49dfe266d91e13aad04e
SHA2565e5089a04ba74a543979e4f5f72f5da9edfca5540aba14a8ed8a4356a92d9c45
SHA512e4c3edb2c3f5fd02501b6a107435d25772148f5ecbf77b4e696cdda94f17e0edd8c655a4a384d5184cdb39f1bcef74daa535596f61cf5a5a58810e28fbb5943d
-
Filesize
72KB
MD54db4900550d3aff5e3325eff17f79bb8
SHA1c17f8489e58a6afec9a5cf88e79b5722cd6d9e65
SHA256b5c6e668534289037c11798ca5a8ced49370971f5659430e36df219310636b99
SHA512931884a8220715b302502149062171d33aca4d646756a492cf4899738ca62aa4b5209c38508593777f92b8907624b8af2fb8379f1b2b10588bf3597fee889f05