Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:49
Static task
static1
Behavioral task
behavioral1
Sample
6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe
Resource
win7-20240903-en
General
-
Target
6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe
-
Size
33KB
-
MD5
6f107f9388e03d5e39dc8906e8366f80
-
SHA1
5954de46cc556f71eed5d3567fa1016f749a604b
-
SHA256
6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4c
-
SHA512
cd9e8f20d6daa33d1f60edcfdcfedd501aee6c9514aa53c26cfba4e6d089d9d8d410cc4a7de41c26a6841caff394b267b8248764abf4dbb11dd6b608b7c54038
-
SSDEEP
768:0fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:0fVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2696 omsecor.exe 1764 omsecor.exe 2284 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2124 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 2124 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 2696 omsecor.exe 2696 omsecor.exe 1764 omsecor.exe 1764 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2696 2124 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 30 PID 2124 wrote to memory of 2696 2124 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 30 PID 2124 wrote to memory of 2696 2124 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 30 PID 2124 wrote to memory of 2696 2124 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 30 PID 2696 wrote to memory of 1764 2696 omsecor.exe 32 PID 2696 wrote to memory of 1764 2696 omsecor.exe 32 PID 2696 wrote to memory of 1764 2696 omsecor.exe 32 PID 2696 wrote to memory of 1764 2696 omsecor.exe 32 PID 1764 wrote to memory of 2284 1764 omsecor.exe 33 PID 1764 wrote to memory of 2284 1764 omsecor.exe 33 PID 1764 wrote to memory of 2284 1764 omsecor.exe 33 PID 1764 wrote to memory of 2284 1764 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe"C:\Users\Admin\AppData\Local\Temp\6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5951e6b40c78220b42e1121d9eb977422
SHA1e9a3eb6cb3463ae2681b6406a7cd2da255d2b046
SHA25680785cf952ac62548c184edb73d85b3a0f237f4bee44ee258e7232c8d1e75e6a
SHA512862aaf5f83b0e2b2fc8473a920b55f1c4962d862bd4a482fa224cdb8e436a7d34105e4d2a985e25a031f570c8bdfc99e1a553c31f7cd050377bd8c6b12688182
-
Filesize
33KB
MD57e4a115e25cec5026f812833777f9258
SHA1401e0a06b1618b2e50311337ea1085534a20a370
SHA2566c8af5455953cbdbab9ea98d01be00a035453a6ec0972c36e28479bded697234
SHA51205003f5afd9c942bc346cc427f96e600feb49fea17e9a5449cd95648184e9d4ebe3a4ae0ac1111a0a60979e0521f9735dcd11eec959257d17bb7183d6c298f5c
-
Filesize
33KB
MD57607a7a80e9c9fe8e0634d95f8f58c6f
SHA1bb9d7a38fe758b53628fd4a048545b658f0683b5
SHA25643e1cdda0de24dce82a65be3a61b0e98e8e384d26892b89fe942dedc4f5c20af
SHA512424c00abfb569d598e8ab0121a504e1cb21d2203e487127f3656b220747926219243ec2da46a4e9f1f872a900006a0a149cfa0c938e0bdadfc7098d38bf48256