Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 06:38
Behavioral task
behavioral1
Sample
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe
Resource
win7-20240903-en
General
-
Target
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe
-
Size
70KB
-
MD5
b483ab5c9018ea96cb70d2b40c4f8d1e
-
SHA1
5d28d055562b55df9e4d4aa9e87c1a8907598d5d
-
SHA256
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429
-
SHA512
3acd494d5c4264d186ad246fc7e189102b0b7deaaadcbb38556a618d04fe8bd29d1ef0368c97e05c0992a0f83759ca9fe6e7e6ec1f8b380dd1160388acbc1ace
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF+N4yS+AQmZsDHNzfE:cdseIOMEZEyFjEOFuTiQm+DHNzfE
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1916 omsecor.exe 2456 omsecor.exe 1816 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2368 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 2368 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 1916 omsecor.exe 1916 omsecor.exe 2456 omsecor.exe 2456 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1916 2368 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2368 wrote to memory of 1916 2368 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2368 wrote to memory of 1916 2368 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2368 wrote to memory of 1916 2368 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 1916 wrote to memory of 2456 1916 omsecor.exe 33 PID 1916 wrote to memory of 2456 1916 omsecor.exe 33 PID 1916 wrote to memory of 2456 1916 omsecor.exe 33 PID 1916 wrote to memory of 2456 1916 omsecor.exe 33 PID 2456 wrote to memory of 1816 2456 omsecor.exe 34 PID 2456 wrote to memory of 1816 2456 omsecor.exe 34 PID 2456 wrote to memory of 1816 2456 omsecor.exe 34 PID 2456 wrote to memory of 1816 2456 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe"C:\Users\Admin\AppData\Local\Temp\b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5314f3c09230b1fd02e44991f7a3753d2
SHA10b65552bf6f4fefa40fa09060b1df05e39542680
SHA2569485a470fde4b2b07930258c8b999d1af7e342c6cfabd0b7e55fe6d0793c76a5
SHA5129c8864fb1b798bde20f18a64f859b16a327db44bc5dbf372e1e882db65d4a470b59b1de08a94a7960e57013eaa1df2464a7628e32c6848177dcb7d7e64c364b0
-
Filesize
70KB
MD58923cc6d987c2b8a833c5f3d89585dff
SHA192710f3ee479d18f9a7e94b585a16d8ac925f920
SHA256655c1a104197b35690688ec8bbb1bc2068625b46a7062f7cb0d4ca787f87ed2b
SHA5121d718a9c9d5d6a31c2c6be99d65c2f7efeefdfdb5bfe6ceb09e10a3676044ebe1f44a5ef4a640d143f555f16ac763962c6bd746ab44c8230cc0a8a367db06fe2
-
Filesize
70KB
MD5da9fc50210b484f77f384be8e204d4b7
SHA168d3af4e9d8a28d02d44a2c8722eefeec101fe64
SHA256400c5e314368630ef4603914f8e96fff73c9061fbe4975f3a3965994f35ffe57
SHA51289b3b63cec05cc0fec662d7062a301bf15f06cffe665e3458eca1723e543b12f68ed12e5f1f612e20b415bbef3b16d307878a461afa1d0bf5422f8ac09e88a86