Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
Resource
win7-20241023-en
General
-
Target
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
-
Size
33KB
-
MD5
72109d4d586848ae060ad7dcc5bd4c3d
-
SHA1
18a6cae894babf63e11965475f7ae09879dc6bf7
-
SHA256
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb
-
SHA512
2959a64b07d0156d906f41c492cf2d37c5d433a98e602e005c2c445c5d866e0565676c693132b08360a45fb9ba4362eb479597fe08872b6b7e213c6dcf3451be
-
SSDEEP
768:lfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:lfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2368 omsecor.exe 1996 omsecor.exe 3012 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2312 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 2312 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 2368 omsecor.exe 2368 omsecor.exe 1996 omsecor.exe 1996 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2368 2312 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 30 PID 2312 wrote to memory of 2368 2312 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 30 PID 2312 wrote to memory of 2368 2312 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 30 PID 2312 wrote to memory of 2368 2312 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 30 PID 2368 wrote to memory of 1996 2368 omsecor.exe 33 PID 2368 wrote to memory of 1996 2368 omsecor.exe 33 PID 2368 wrote to memory of 1996 2368 omsecor.exe 33 PID 2368 wrote to memory of 1996 2368 omsecor.exe 33 PID 1996 wrote to memory of 3012 1996 omsecor.exe 34 PID 1996 wrote to memory of 3012 1996 omsecor.exe 34 PID 1996 wrote to memory of 3012 1996 omsecor.exe 34 PID 1996 wrote to memory of 3012 1996 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b9a39935d4b094a42592af4539240699
SHA169d545c43f0c93a4de7e383c4327113c44802e11
SHA2560d08986cc271728a41463a0cc81164834b216c29dead919320704db57e1ac5c3
SHA512e9bf5d903385d2e5fe3b2ff5b5fcbe67bef9a39fab2cf66115276c36a4aa8be891149c9ddd63bd9dbabd49b182fddd84aab19806a5ac0ce2d84ab09e4c8a11f3
-
Filesize
33KB
MD567054ee6b018f33f4acca62d29ad8dc7
SHA10cd6eaf59ad2f28d528142bbe3ceabe31f861860
SHA2564157bf287a0b38c0deef0351bb40d81eaddf7715adfb39977278ec3bdb1bc28c
SHA512b8401e387dcf5583a451c6483f431c7c0c356511a7d325195d0d83751d38f18448b6644a2f0bdb4ef2485e4d5e1ca3f15283c7afaa228f6ffc4b2d26d4aca17c
-
Filesize
33KB
MD5c3c5f545547ede4ffcad2aadbd7e70ad
SHA1264538ae8b1e00169195de15b1fb7d8d9629e6b8
SHA2567bebca24813163a14fca4c4e23625d4e750b9bfb6ba0fcb8de66c9b9e89f7eed
SHA51276cc3444e0d75403eb5bb636ac8fa516d4eb1822f27958ab30a1b89a96aa091970df8ea66ca95cc1c3aa4ea48f204ab8470af2f616ce5b59a548ad92a705dbac