Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 01:19
Behavioral task
behavioral1
Sample
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe
Resource
win7-20240729-en
General
-
Target
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe
-
Size
80KB
-
MD5
4d3cc41faa31eb96295e76864a47ea99
-
SHA1
d6fb975c6b1dad0bb857203bf41475bbc5a873f5
-
SHA256
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c
-
SHA512
6757cf1be1dc65c7b876bad17cefb8b9ace5340249df9448a8ec331f11bda36447da7a36b3bb9831e06bd9f93da81af4af7e62a8307fc6ab2a1269fb29ad2984
-
SSDEEP
1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:3dseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2680 omsecor.exe 1228 omsecor.exe 1428 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3028 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 3028 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 2680 omsecor.exe 2680 omsecor.exe 1228 omsecor.exe 1228 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2680 3028 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 30 PID 3028 wrote to memory of 2680 3028 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 30 PID 3028 wrote to memory of 2680 3028 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 30 PID 3028 wrote to memory of 2680 3028 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 30 PID 2680 wrote to memory of 1228 2680 omsecor.exe 33 PID 2680 wrote to memory of 1228 2680 omsecor.exe 33 PID 2680 wrote to memory of 1228 2680 omsecor.exe 33 PID 2680 wrote to memory of 1228 2680 omsecor.exe 33 PID 1228 wrote to memory of 1428 1228 omsecor.exe 34 PID 1228 wrote to memory of 1428 1228 omsecor.exe 34 PID 1228 wrote to memory of 1428 1228 omsecor.exe 34 PID 1228 wrote to memory of 1428 1228 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe"C:\Users\Admin\AppData\Local\Temp\60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55b0978f5c2fe1253a95af92680bbb4f4
SHA1033d632a43734bdea234c9dd2819f07d6cb91a6a
SHA2568d35f64d7f4e23eb47d46ae05a7db76e6769e6cd7cf7f4c4f50911b0805155a6
SHA512d795b234f3819e45db18c1642b48dfa256478aad7eef7b119b728d7a0a49cc71adf1d761c37a86caf00599e686e8776ce9c3da888f74940b3940b9f980c439d1
-
Filesize
80KB
MD57e78759f9959bb1b000d9d431abae41b
SHA179df5f13889ec9f87bf2c8f093574d94fa24780b
SHA25696c7acd025b5a23d50116f6d052b5ea78f738288ae02e7d91b3b1ccd717328bc
SHA5121da7ffb43390c4c7cce186ef6adfe9ad1f16be94ef88f377b24ebb49f599f2fcabc38e2d68b40b62a3071ae0fec276f6ca93d45f1de60f9bb6ee371439222cde
-
Filesize
80KB
MD589ce14a1c07e4eb7ef1e24f99f978d44
SHA1762a0dbca8762059077432b64dd30fdef4203c14
SHA256d5d0fdb8d4486731751cfd6e357cc7a30370823b7e63d7fe1ef048525ff06b46
SHA512c7619dd4fe821d6beb39b04b4e4daaab4dd27377a13719f2ae5e4eb22612449368978fed69cc53270e8304c74b5682385e4cf9d1fa5718cec80aad0d76741f13