Analysis
-
max time kernel
107s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11/01/2025, 18:35 UTC
Behavioral task
behavioral1
Sample
7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe
Resource
win7-20241023-en
General
-
Target
7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe
-
Size
76KB
-
MD5
69283bb5bc570089d169328e822ac0e0
-
SHA1
f124019a4ccd967b4a91dafce59097ef6d845850
-
SHA256
7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799a
-
SHA512
14306466426455e85d9805d509a89c5809c836a87607742b0bea83873831736544ded10e2779f808185cf8d976be2f999093fc5643e0616858b1c64c0447333b
-
SSDEEP
1536:Xd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:fdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2968 omsecor.exe 2900 omsecor.exe 1388 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2952 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 2952 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 2968 omsecor.exe 2968 omsecor.exe 2900 omsecor.exe 2900 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2968 2952 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 30 PID 2952 wrote to memory of 2968 2952 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 30 PID 2952 wrote to memory of 2968 2952 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 30 PID 2952 wrote to memory of 2968 2952 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 30 PID 2968 wrote to memory of 2900 2968 omsecor.exe 33 PID 2968 wrote to memory of 2900 2968 omsecor.exe 33 PID 2968 wrote to memory of 2900 2968 omsecor.exe 33 PID 2968 wrote to memory of 2900 2968 omsecor.exe 33 PID 2900 wrote to memory of 1388 2900 omsecor.exe 34 PID 2900 wrote to memory of 1388 2900 omsecor.exe 34 PID 2900 wrote to memory of 1388 2900 omsecor.exe 34 PID 2900 wrote to memory of 1388 2900 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe"C:\Users\Admin\AppData\Local\Temp\7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
Network
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:8.8.8.8:53Requestlousta.netIN A
-
Remote address:8.8.8.8:53Requestmkkuei4kdsz.comIN AResponsemkkuei4kdsz.comIN A3.33.243.145mkkuei4kdsz.comIN A15.197.204.56
-
Remote address:3.33.243.145:80RequestGET /650/806.html HTTP/1.1
From: 133810941512746000
Via: emohgso\sgt>9.6`apfc>7\qcpbo;22.1213`mt?423/_mcz?52ed84`b32gf`7h/cg4bh18d.ee4c4dg
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Sat, 11 Jan 2025 18:37:08 GMT
content-length: 114
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN AResponseow5dirasuek.comIN A52.34.198.229
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN A
-
Remote address:52.34.198.229:80RequestGET /64/320.html HTTP/1.1
From: 133810941512746000
Via: emohgso\sgt>9.6`apfc>7\qcpbo;22.1213`mt?423/_mcz?52ed84`b32gf`7h/cg4bh18d.ee4c4dg
Host: ow5dirasuek.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Sat, 11 Jan 2025 18:37:19 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=a5794eaffd188e0ebf0b3aa64d19f0f8|181.215.176.83|1736620639|1736620639|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
152 B 3
-
152 B 3
-
804 B 640 B 9 5
HTTP Request
GET http://mkkuei4kdsz.com/650/806.htmlHTTP Response
200 -
420 B 623 B 5 5
HTTP Request
GET http://ow5dirasuek.com/64/320.htmlHTTP Response
200 -
152 B 3
-
112 B 72 B 2 1
DNS Request
lousta.net
DNS Request
lousta.net
DNS Response
193.166.255.171
-
61 B 93 B 1 1
DNS Request
mkkuei4kdsz.com
DNS Response
3.33.243.14515.197.204.56
-
122 B 77 B 2 1
DNS Request
ow5dirasuek.com
DNS Request
ow5dirasuek.com
DNS Response
52.34.198.229
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5754f7742e64098569ee4c4d15fdccb84
SHA16fe048c9d1ed5337b1b65cd0f641a71eeda9c1dd
SHA2565eefff4b213b342ced4d42b1748700c0682b3f30d27d38d406b731980f19e7cd
SHA512a8ac38f30108740edc1df7a1fc690111112dc1191b92a26b5c69d07cbe86f706b9cc8c6ee5b845a93b69e9355aa2b3e321ba1d481a4e4754c16ccab7e32a9331
-
Filesize
76KB
MD5e44b191f899af00f8103c6ab5b43e178
SHA1d8a7b33da76624145bcc790c3baa8557f22cd4a3
SHA2567f724bdf3b2da8ed56f32b90adb248d8e61ae4b635c521e780c059790af5b1a9
SHA5129f6003d8e683ede2e07fc5a8c4cf1f6aeef4fb2894df583c0217785fe697ab2e381fdabfa5cae1d7f93f8e126f03378533ded6ac25405e529ab0183983803622
-
Filesize
76KB
MD5a32f73533ccae41a62459ae7fcca875f
SHA17ded7d3e048700fa43de034a19ac00f8d4485b4e
SHA256ce869721df9edd07af3235048b80b51559f6be0581a5cc3d6c966a4c28541217
SHA512ea5e73c992e438a416728114bbef681a359fbcb8b3317d7ab9548dff49bc4c7f016de7a635c7625c26cab97360b7fcc6f6754c1f846922572b858167829735a9