Analysis
-
max time kernel
115s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 03:08
Behavioral task
behavioral1
Sample
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
Resource
win7-20241010-en
General
-
Target
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
-
Size
61KB
-
MD5
59ada6b8a5b4b1d95057515b1872a6a3
-
SHA1
fb1ee815d23703c8182d9f2d4209d47678201cba
-
SHA256
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69
-
SHA512
3afaba73b5be8cc19a1c2ef5307af9ba8ebb5924233ba22ca8e9c3d2c302b15f0bcdab8f419151058f910144c16541f7cd1db66f5895f3d0a3c67d9412debed1
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/53:edseIOMEZEyFjEOFqTiQmTl/53
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2472 omsecor.exe 1144 omsecor.exe 3028 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3000 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 3000 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 2472 omsecor.exe 2472 omsecor.exe 1144 omsecor.exe 1144 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2472 3000 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 29 PID 3000 wrote to memory of 2472 3000 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 29 PID 3000 wrote to memory of 2472 3000 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 29 PID 3000 wrote to memory of 2472 3000 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 29 PID 2472 wrote to memory of 1144 2472 omsecor.exe 31 PID 2472 wrote to memory of 1144 2472 omsecor.exe 31 PID 2472 wrote to memory of 1144 2472 omsecor.exe 31 PID 2472 wrote to memory of 1144 2472 omsecor.exe 31 PID 1144 wrote to memory of 3028 1144 omsecor.exe 32 PID 1144 wrote to memory of 3028 1144 omsecor.exe 32 PID 1144 wrote to memory of 3028 1144 omsecor.exe 32 PID 1144 wrote to memory of 3028 1144 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD56353b341752d72e1d3571499437d9bef
SHA1f53b39ba778dcf7c52da3f42b15128068740787e
SHA25659e51d94da228aa8c60558f80760cc064c89b0f55c6b09d1d80ce2163c553510
SHA5125432b91ae7f2f9e8fbaf670c01506cb117e2d1c55fdffff01ee2f0f2b097b6ae851076541278ba99ef530e4f9c8290adec26ffb0868a99b23651c79de369076d
-
Filesize
61KB
MD5392ed7053507b87da5812421da7a2578
SHA17888db5b7ca8bbc1851ee96c4232b81518ce7e3a
SHA256995fcb6bfce554e3f11a52537e131dc429ea9bef30e68cc150712832ec85e07b
SHA512245ad3841e2077e7b61501c4cda85ad8d3f2148e3f09f0e9ad1dae70e27dcfb8ad8cdaa975d54ec0489646d539a2915494ea584fececb42be50a6496c163b4f2
-
Filesize
61KB
MD5b060dbb42a37c4840161e623dc1c6fc6
SHA17834ea4aaa4f45e8019873dcd9e197bf9596dce0
SHA2563c38388704a705c0a273d1343a3971338aef76cfea903c03808c13f505546bb0
SHA51266568df1a68c024f3ef261c0b9f54a50093756c02c435b055ce72c37463f437790316ee3d9a3fe553c9ba701db31bd6713ea7b85bf4204a36459fe2c1293c14a