Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 01:29
Behavioral task
behavioral1
Sample
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe
Resource
win7-20240903-en
General
-
Target
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe
-
Size
80KB
-
MD5
4d3cc41faa31eb96295e76864a47ea99
-
SHA1
d6fb975c6b1dad0bb857203bf41475bbc5a873f5
-
SHA256
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c
-
SHA512
6757cf1be1dc65c7b876bad17cefb8b9ace5340249df9448a8ec331f11bda36447da7a36b3bb9831e06bd9f93da81af4af7e62a8307fc6ab2a1269fb29ad2984
-
SSDEEP
1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:3dseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1232 omsecor.exe 1776 omsecor.exe 2932 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2396 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 2396 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 1232 omsecor.exe 1232 omsecor.exe 1776 omsecor.exe 1776 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1232 2396 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 31 PID 2396 wrote to memory of 1232 2396 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 31 PID 2396 wrote to memory of 1232 2396 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 31 PID 2396 wrote to memory of 1232 2396 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 31 PID 1232 wrote to memory of 1776 1232 omsecor.exe 33 PID 1232 wrote to memory of 1776 1232 omsecor.exe 33 PID 1232 wrote to memory of 1776 1232 omsecor.exe 33 PID 1232 wrote to memory of 1776 1232 omsecor.exe 33 PID 1776 wrote to memory of 2932 1776 omsecor.exe 34 PID 1776 wrote to memory of 2932 1776 omsecor.exe 34 PID 1776 wrote to memory of 2932 1776 omsecor.exe 34 PID 1776 wrote to memory of 2932 1776 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe"C:\Users\Admin\AppData\Local\Temp\60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD523b093a6b24929e17383b1e6531e4784
SHA1d801e11ecc2b0134eb022323b9f8938e36d87b84
SHA256b8f4dd86fb1fa0de90ec7c8b4c65ffc6d9a4551a74fc4acb656b3dfa861c4150
SHA51217464e9b35d9b1b124b5635074402578b4316cc3719aa63050658f4bc57c78d5e99f24d038629272f638545a479a6220865094c1cc1a5d163403eaf23b99dbc8
-
Filesize
80KB
MD55b0978f5c2fe1253a95af92680bbb4f4
SHA1033d632a43734bdea234c9dd2819f07d6cb91a6a
SHA2568d35f64d7f4e23eb47d46ae05a7db76e6769e6cd7cf7f4c4f50911b0805155a6
SHA512d795b234f3819e45db18c1642b48dfa256478aad7eef7b119b728d7a0a49cc71adf1d761c37a86caf00599e686e8776ce9c3da888f74940b3940b9f980c439d1
-
Filesize
80KB
MD5090af4864431df940cddb25f6b668341
SHA13e2d9c873af22944665b18e13670f67256691d06
SHA25691a6bed86df7e4c28cea7fffa665f706e1c216bc8f98674eb25f068a8da64225
SHA512b4c9e555c02c95b07ff951e23e6d22ae3c08db966deaf21f8472b9d64d6b0ae2e071d65bb488e2ff032aa638624ffaffe8aa6491814fc8f7b4c24100972039c8