Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 23:11
Behavioral task
behavioral1
Sample
44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe
Resource
win7-20240903-en
General
-
Target
44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe
-
Size
72KB
-
MD5
ce702c309268bd335ff5aed6ea8f642e
-
SHA1
a510ea50a34d82557ddd10241ab76444285dd86f
-
SHA256
44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13
-
SHA512
124dd45b960eb4113cd37556f59ac5750acce05150276c016650a385fd90411f0066e23b3ed489ed627be3989bb7216165a12e4a604efe51ef7be1347804ca17
-
SSDEEP
1536:3d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211t:/dseIOMEZEyFjEOFqTiQm5l/5211t
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 788 omsecor.exe 2744 omsecor.exe 2604 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2900 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe 2900 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe 788 omsecor.exe 788 omsecor.exe 2744 omsecor.exe 2744 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2900 wrote to memory of 788 2900 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe 28 PID 2900 wrote to memory of 788 2900 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe 28 PID 2900 wrote to memory of 788 2900 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe 28 PID 2900 wrote to memory of 788 2900 44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe 28 PID 788 wrote to memory of 2744 788 omsecor.exe 32 PID 788 wrote to memory of 2744 788 omsecor.exe 32 PID 788 wrote to memory of 2744 788 omsecor.exe 32 PID 788 wrote to memory of 2744 788 omsecor.exe 32 PID 2744 wrote to memory of 2604 2744 omsecor.exe 33 PID 2744 wrote to memory of 2604 2744 omsecor.exe 33 PID 2744 wrote to memory of 2604 2744 omsecor.exe 33 PID 2744 wrote to memory of 2604 2744 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe"C:\Users\Admin\AppData\Local\Temp\44d7f7aeb34e71ba2c682a02a7a8e3ee10853a3ee3da5da074d963198a920e13.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD589c3bbc4fb5b2e61249dc757895981e1
SHA187a375a4f3af566e691b396d333e6fe7e638ba85
SHA256cbadfee086874003f0c667e1b6cb98cf1706b7ad24c41579db5252edbe2d05ee
SHA5122e51a3fc413f013382de404bed2c6d1a76be8a610ec6ee56c41c83e4ed820d6fc1a0b871a625b97401896e1b04e375dfe95a0013cf0a047aa73884676ed1c6cb
-
Filesize
72KB
MD5e1f361b1f0bba85269a990fa8c436471
SHA1e83db3e91661d81d85af2df5556fc3d60cb50a4d
SHA2564ab57032c59e8ec887560b7e1ad8200f2560df38893aee81e019aaadc29b0220
SHA5126d314bd4854c2048c43cb39691cf3f5b5de4605d28ff777ad19b5502dd96ac30b3ad8dadc5245074f42cb4ce833bfea56dce6b511a205b9ddca49dfdae6fe70c
-
Filesize
72KB
MD5e6d11000336415aa43e6a45bec6ae39e
SHA1a84b9acd8b591938c9d17937141858f711ac8892
SHA256411181a4c6a9000b41a84a0e0aee8704b1561e6874452be6c5f0587c99fbaaf8
SHA5122f88cb6f8f7be85b7dd91284e2048924b39a05d42b3879dc372e62b7d6cd20f72fbfa4327564becd4038eef9b00ccbe6db3a9b370344b1edfa305f8f0ebbc45e