Analysis
-
max time kernel
124s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 06:46
Behavioral task
behavioral1
Sample
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe
Resource
win7-20241023-en
General
-
Target
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe
-
Size
70KB
-
MD5
b483ab5c9018ea96cb70d2b40c4f8d1e
-
SHA1
5d28d055562b55df9e4d4aa9e87c1a8907598d5d
-
SHA256
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429
-
SHA512
3acd494d5c4264d186ad246fc7e189102b0b7deaaadcbb38556a618d04fe8bd29d1ef0368c97e05c0992a0f83759ca9fe6e7e6ec1f8b380dd1160388acbc1ace
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF+N4yS+AQmZsDHNzfE:cdseIOMEZEyFjEOFuTiQm+DHNzfE
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2336 omsecor.exe 2444 omsecor.exe 1064 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2136 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 2136 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 2336 omsecor.exe 2336 omsecor.exe 2444 omsecor.exe 2444 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2336 2136 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2136 wrote to memory of 2336 2136 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2136 wrote to memory of 2336 2136 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2136 wrote to memory of 2336 2136 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 30 PID 2336 wrote to memory of 2444 2336 omsecor.exe 33 PID 2336 wrote to memory of 2444 2336 omsecor.exe 33 PID 2336 wrote to memory of 2444 2336 omsecor.exe 33 PID 2336 wrote to memory of 2444 2336 omsecor.exe 33 PID 2444 wrote to memory of 1064 2444 omsecor.exe 34 PID 2444 wrote to memory of 1064 2444 omsecor.exe 34 PID 2444 wrote to memory of 1064 2444 omsecor.exe 34 PID 2444 wrote to memory of 1064 2444 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe"C:\Users\Admin\AppData\Local\Temp\b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD56a134bc2483bf9e7ea69055c220bb4bc
SHA18373c2056feef71908d80947a26569c7fd428e79
SHA2562bd0529401f83a86f746e9d896a8a22a1f43f4c2f2c92479aedfeb9b09ed7149
SHA512cd46e58b660d3fd716a23f92330879d8fc0aac911b8162b55cb0afc891bdfe9951fdecf2340c4b5d55d1ed28257877ba2ab60fc73f3f1cf82d9a0ce03dced734
-
Filesize
70KB
MD5314f3c09230b1fd02e44991f7a3753d2
SHA10b65552bf6f4fefa40fa09060b1df05e39542680
SHA2569485a470fde4b2b07930258c8b999d1af7e342c6cfabd0b7e55fe6d0793c76a5
SHA5129c8864fb1b798bde20f18a64f859b16a327db44bc5dbf372e1e882db65d4a470b59b1de08a94a7960e57013eaa1df2464a7628e32c6848177dcb7d7e64c364b0
-
Filesize
70KB
MD54d34189dc2fe8397aae6da50092656eb
SHA1731deb19a01d8a2e05df3656e12ac881efbb5995
SHA256cf11bbae550082564b4d8ae9f44759cb0ef6789e18c2eeaeed7ba2355137049e
SHA51223ba45a1e912ff4f731569bb02e0196c1da9023c385b25cd3e2470658fdca40db4f675f8b96032a6ed9a505a1988e72c4c76af0fc1772811ea0da521ebe281bd