Analysis
-
max time kernel
114s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 04:20
Behavioral task
behavioral1
Sample
6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe
Resource
win7-20240729-en
General
-
Target
6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe
-
Size
61KB
-
MD5
b39f829b6686b24bf83dd1c07bb4ea00
-
SHA1
dbea6a04c22ce7935ec1a3835571ff69ac878573
-
SHA256
6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362
-
SHA512
e5f7c5270b49afaa3ef6369f6ed7d441156b6c4c8d4b0790585545f13111eea1b3a09690f8af993e96859f630c43fb99f2a9d8d73dd402139571e30861619f22
-
SSDEEP
1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5P:kdseIOMEZEyFjEOFqTiQmil/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2760 omsecor.exe 2124 omsecor.exe 2624 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2188 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 2188 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 2760 omsecor.exe 2760 omsecor.exe 2124 omsecor.exe 2124 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2760 2188 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 30 PID 2188 wrote to memory of 2760 2188 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 30 PID 2188 wrote to memory of 2760 2188 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 30 PID 2188 wrote to memory of 2760 2188 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 30 PID 2760 wrote to memory of 2124 2760 omsecor.exe 32 PID 2760 wrote to memory of 2124 2760 omsecor.exe 32 PID 2760 wrote to memory of 2124 2760 omsecor.exe 32 PID 2760 wrote to memory of 2124 2760 omsecor.exe 32 PID 2124 wrote to memory of 2624 2124 omsecor.exe 33 PID 2124 wrote to memory of 2624 2124 omsecor.exe 33 PID 2124 wrote to memory of 2624 2124 omsecor.exe 33 PID 2124 wrote to memory of 2624 2124 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe"C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD598a72a1c18fd244939887d2c37bf6e9f
SHA12a243e0c72cd3a6fd60a846648ef6b4ac4e5905a
SHA2561da5fadb236e26beb9ffff99f751ea23df815dedc0d8cf82563c8fb5f5bcaee9
SHA51215e6a8e65892328488facfb1ad49581e163b0622b82736a880bf5f82947fdced61a2f6a0ff049717a0b76a494a05b27d37af0da1e45c3d2b22918c1aa73b114b
-
Filesize
61KB
MD5ab14be5452c9deab0b7932fd1af035ee
SHA1e9e7abb7e3b47868e0f0082c0a4dde74c5e41c55
SHA256b4d631c54725c994fc29e153d90c95b8759d15c7daa529b4d8686a1519141371
SHA512e04c4fa25f8084d972f1820afbadc99eb50e3994ac4aacbc2a558ae93eeade98b0cba24ffefc7b60c7d14cfac992cc1046e8c4762ec8da3ac68e5cb605ae6c54
-
Filesize
61KB
MD54b7367bde27812908de61d71ec620c08
SHA16e8e873fb842559437d3dcc13030e47eda63b30a
SHA25626992c45fbe0df62cdf6daed97abbe9730b26daae5c381ee88a7351414986186
SHA512b185934c14c0b937d0908120200db40a51164a85ab1c1e68397e9bd0d4f5dc8e8543e47b9eb5493f79eb71aa2bf7e496d8b2ebe9aa2bdbdf7890500a31476839