Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 02:03
Static task
static1
Behavioral task
behavioral1
Sample
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe
Resource
win7-20241010-en
General
-
Target
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe
-
Size
33KB
-
MD5
d627fd51d8e3fcadec9782fc1ef67f9c
-
SHA1
c35250b53809f60ef1bdb0f7ef36af3ed2c4d1f9
-
SHA256
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f
-
SHA512
a8d1b9e9fad63d5b69b9cc2e21e3dd9adea9c598b2a64b45f76808fe70d2d129af37ac301dabf128895f814abc209796f5d2a2ac91efe727d262ca4546e3cdc0
-
SSDEEP
768:XfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7Dd:XfVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3064 omsecor.exe 1628 omsecor.exe 760 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2028 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 2028 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 3064 omsecor.exe 3064 omsecor.exe 1628 omsecor.exe 1628 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3064 2028 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2028 wrote to memory of 3064 2028 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2028 wrote to memory of 3064 2028 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 2028 wrote to memory of 3064 2028 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 30 PID 3064 wrote to memory of 1628 3064 omsecor.exe 33 PID 3064 wrote to memory of 1628 3064 omsecor.exe 33 PID 3064 wrote to memory of 1628 3064 omsecor.exe 33 PID 3064 wrote to memory of 1628 3064 omsecor.exe 33 PID 1628 wrote to memory of 760 1628 omsecor.exe 34 PID 1628 wrote to memory of 760 1628 omsecor.exe 34 PID 1628 wrote to memory of 760 1628 omsecor.exe 34 PID 1628 wrote to memory of 760 1628 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe"C:\Users\Admin\AppData\Local\Temp\f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:760
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5ab7fdee41c544f19e60b4464b9a848f8
SHA16ee80e4d38700a6cfb49fe9320e480135cfd3733
SHA2561e1041ba8e87da63071234fa38acd1062c86436d455278aa844121419c6d0e86
SHA512f1969decfbca4a5348546735ba2a9e104694d883f353373f672bf700fae8139477390de8115b482c56be6c8874ecc244d3b017c7cf32f95a6b75ccd8a7a896cb
-
Filesize
33KB
MD5068e92d741bd9be2cdff3e2ac7971223
SHA10b7e98a4713d449bf598d0fbc2e9b7e821332e36
SHA256aabf159eae248a119b3b715028d54e14be066243666dd98d2808d03ba3178ddc
SHA512a318128daa2cf4f7613216cda396ff8bd789aa1b956b5b3b4e8e53b2f7d40f2e76b4aafba60b682df0357180982831fe2bf96d6905948a4d98e3ac57151734d3
-
Filesize
33KB
MD5a78ec1162e2cfa99bfd06408cf3623fa
SHA170e0b7baaeac37568c8086079f4beefd25889199
SHA256197284aa28f56f1efbe01064c2612500b78c39d5c0a2af8adaf9f307256ee55f
SHA5125cf95bb02e45b64aaf497e900e626d47c5ed703e936fbb04e0b2c2c6bb9fc9fb8019c08b0c2c499500bd064d91fcf3b418adf49c189d10b8abeccc270089db95