Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 01:56
Static task
static1
Behavioral task
behavioral1
Sample
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe
Resource
win7-20240729-en
General
-
Target
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe
-
Size
33KB
-
MD5
d627fd51d8e3fcadec9782fc1ef67f9c
-
SHA1
c35250b53809f60ef1bdb0f7ef36af3ed2c4d1f9
-
SHA256
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f
-
SHA512
a8d1b9e9fad63d5b69b9cc2e21e3dd9adea9c598b2a64b45f76808fe70d2d129af37ac301dabf128895f814abc209796f5d2a2ac91efe727d262ca4546e3cdc0
-
SSDEEP
768:XfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7Dd:XfVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2092 omsecor.exe 1732 omsecor.exe 2228 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2172 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 2172 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 2092 omsecor.exe 2092 omsecor.exe 1732 omsecor.exe 1732 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2092 2172 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2172 wrote to memory of 2092 2172 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2172 wrote to memory of 2092 2172 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2172 wrote to memory of 2092 2172 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2092 wrote to memory of 1732 2092 omsecor.exe 33 PID 2092 wrote to memory of 1732 2092 omsecor.exe 33 PID 2092 wrote to memory of 1732 2092 omsecor.exe 33 PID 2092 wrote to memory of 1732 2092 omsecor.exe 33 PID 1732 wrote to memory of 2228 1732 omsecor.exe 34 PID 1732 wrote to memory of 2228 1732 omsecor.exe 34 PID 1732 wrote to memory of 2228 1732 omsecor.exe 34 PID 1732 wrote to memory of 2228 1732 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe"C:\Users\Admin\AppData\Local\Temp\f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b1a5d5a6729ea48a776a5bae8fc1f83f
SHA1692c01bdbec4db348aa8ee4629736140e0351db2
SHA256890cb5055153c5d17a4d6ee51525c6250b2574fac71129f941b1419a493e2679
SHA512ddc91988f42337ae6765d9708b1754b93c7ca7cd25750ccc3ace50a195d5b63d64ce6bfddfe854ccda96603d4b7f068cd3d77fc3940f1d45647a22d76e3ec7e6
-
Filesize
33KB
MD5ab7fdee41c544f19e60b4464b9a848f8
SHA16ee80e4d38700a6cfb49fe9320e480135cfd3733
SHA2561e1041ba8e87da63071234fa38acd1062c86436d455278aa844121419c6d0e86
SHA512f1969decfbca4a5348546735ba2a9e104694d883f353373f672bf700fae8139477390de8115b482c56be6c8874ecc244d3b017c7cf32f95a6b75ccd8a7a896cb
-
Filesize
33KB
MD5920e77cf6f461c029c617a09e7502b0f
SHA19c2f0bb5285dc8d3dca34c62022c236d8f64e6ca
SHA256e53244c16f94fe9eab5356ce1153da18a73f85710920a8de90ab8d539e25e5a1
SHA512674edaffbb833ad43143dde33035e3216f1d0ae93be235394188141c6798a2e56542975bd0dd69383a779504b00450e2f0ae1d98db03d70daff3d9ffd596641f