Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 04:23
Static task
static1
Behavioral task
behavioral1
Sample
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
Resource
win7-20240903-en
General
-
Target
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
-
Size
33KB
-
MD5
72109d4d586848ae060ad7dcc5bd4c3d
-
SHA1
18a6cae894babf63e11965475f7ae09879dc6bf7
-
SHA256
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb
-
SHA512
2959a64b07d0156d906f41c492cf2d37c5d433a98e602e005c2c445c5d866e0565676c693132b08360a45fb9ba4362eb479597fe08872b6b7e213c6dcf3451be
-
SSDEEP
768:lfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:lfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2148 omsecor.exe 2288 omsecor.exe 1652 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1996 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 1996 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 2148 omsecor.exe 2148 omsecor.exe 2288 omsecor.exe 2288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2148 1996 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 31 PID 1996 wrote to memory of 2148 1996 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 31 PID 1996 wrote to memory of 2148 1996 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 31 PID 1996 wrote to memory of 2148 1996 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 31 PID 2148 wrote to memory of 2288 2148 omsecor.exe 33 PID 2148 wrote to memory of 2288 2148 omsecor.exe 33 PID 2148 wrote to memory of 2288 2148 omsecor.exe 33 PID 2148 wrote to memory of 2288 2148 omsecor.exe 33 PID 2288 wrote to memory of 1652 2288 omsecor.exe 34 PID 2288 wrote to memory of 1652 2288 omsecor.exe 34 PID 2288 wrote to memory of 1652 2288 omsecor.exe 34 PID 2288 wrote to memory of 1652 2288 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b9a39935d4b094a42592af4539240699
SHA169d545c43f0c93a4de7e383c4327113c44802e11
SHA2560d08986cc271728a41463a0cc81164834b216c29dead919320704db57e1ac5c3
SHA512e9bf5d903385d2e5fe3b2ff5b5fcbe67bef9a39fab2cf66115276c36a4aa8be891149c9ddd63bd9dbabd49b182fddd84aab19806a5ac0ce2d84ab09e4c8a11f3
-
Filesize
33KB
MD5b76d99ebe7551e421b0d0c7a9bd2468f
SHA1110b4912c4918a6c50c145d53a8edaf7e8d9fb0a
SHA256b1ae463b987d86a6c88e8965e39f58c4c7fa2e557ff5919732482641fe47b896
SHA512b6e6f7c15b50e33aa7b3804bc18d76552d9ae7fb11b94b5f19f22b0189b4da3989b49a5a627988f08733373241d77a0dc4668ef3167024e36b0c998563caf057
-
Filesize
33KB
MD54540fad8621df0fdaeb3322dec637235
SHA15ef17d3219cb4ab0044d5470796bdc042bbbedac
SHA25669cc7fddec0e5d3f09aca402b63daf679cdec5fd2e18d887c1b1ff95d86f8339
SHA51220a429f0a9b142058b54c7421bb35754702bfe3b7e7a47c2460b542553c315ba6fc02aec77ac632403a2ca1e6e7e6fc0278015fa8122ffb95ac77e6e4ddef212