Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 11:32
Behavioral task
behavioral1
Sample
59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe
Resource
win7-20241023-en
General
-
Target
59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe
-
Size
80KB
-
MD5
c70b906c7966a01b50d98bb0932f93d0
-
SHA1
6dce14bbf4a24f0473890e12bdcca47d987627c3
-
SHA256
59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2ad
-
SHA512
28767323e4126fcf9d9174b31ce98ae4571c97825e6286c170ca77466d0f9d030637fa6974548e79a76f97b28d75d8a56ae78b71e9c451d886cb3be2e29fabd9
-
SSDEEP
1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:kdseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2360 omsecor.exe 2180 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 2128 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 2128 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 2360 omsecor.exe 2360 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2360 2128 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 30 PID 2128 wrote to memory of 2360 2128 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 30 PID 2128 wrote to memory of 2360 2128 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 30 PID 2128 wrote to memory of 2360 2128 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 30 PID 2360 wrote to memory of 2180 2360 omsecor.exe 33 PID 2360 wrote to memory of 2180 2360 omsecor.exe 33 PID 2360 wrote to memory of 2180 2360 omsecor.exe 33 PID 2360 wrote to memory of 2180 2360 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe"C:\Users\Admin\AppData\Local\Temp\59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57deaf7e97077c65a7c8c57bbe9036b1a
SHA1d0bed3c1cc8891c3e5948b9b76ec9c8d53a31141
SHA2560d6050201bf7f46eba5100007b783a044628e279f405fa0ca094a626eda166d1
SHA512dff936881ce0da77af2dcdf4fa8a8ec58d526d3d8405a712d1e3baed11715da2af8b93173e4a3b1430fb268ee824d5700b38d96befd35f751fb59f1cccd14de0
-
Filesize
80KB
MD5f9ac1394645e7dccfd419d2bd1916ff1
SHA14dd7fe2f277208a2f87639d2fd15303d6729ebc9
SHA256380144a3b1ef668e482264bf8953a6f1d07b647cfda37d12a7e62cd2e7f57006
SHA5124b385942fa15d73a700093f19017ee194d7ccf056b241e59e44437027b426704c9b922364cd2805e529bbe1f0dd26c0b262cd34fc15230c61b33940d01aad710