Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 18:58
Behavioral task
behavioral1
Sample
262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe
Resource
win7-20241010-en
General
-
Target
262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe
-
Size
80KB
-
MD5
101d5cd00c4defa5eeaa89725f7f0df0
-
SHA1
4fa0c6aed99fb5f63437ca7591a1e952b56bf285
-
SHA256
262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3
-
SHA512
0dea35cf236cac8ae34d6e71a1e5431b5f5cab5fbbc8d5ba808994c7383fdb722a3e7a28f3d2d83e42aad8843aa6adb75538b210ef79038fb1593228b1aea407
-
SSDEEP
1536:ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:6dseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 344 omsecor.exe 2012 omsecor.exe 888 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2372 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe 2372 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe 344 omsecor.exe 344 omsecor.exe 2012 omsecor.exe 2012 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2372 wrote to memory of 344 2372 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe 30 PID 2372 wrote to memory of 344 2372 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe 30 PID 2372 wrote to memory of 344 2372 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe 30 PID 2372 wrote to memory of 344 2372 262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe 30 PID 344 wrote to memory of 2012 344 omsecor.exe 33 PID 344 wrote to memory of 2012 344 omsecor.exe 33 PID 344 wrote to memory of 2012 344 omsecor.exe 33 PID 344 wrote to memory of 2012 344 omsecor.exe 33 PID 2012 wrote to memory of 888 2012 omsecor.exe 34 PID 2012 wrote to memory of 888 2012 omsecor.exe 34 PID 2012 wrote to memory of 888 2012 omsecor.exe 34 PID 2012 wrote to memory of 888 2012 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe"C:\Users\Admin\AppData\Local\Temp\262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD51beb4d67d24d37bc26fa174684fd6cdf
SHA1da15db4289eac1e14fc5daf2059c8d0963e38a37
SHA2561ac8b9ce6a3d3dc8ecf51f697252a06703ef63805f9d06e980b4a2411816fee2
SHA5121be516c21e06affbe23c2baadf5fd1b20c258bae431d7fb7784c66cb3849ae6a11aedc886243c2b59a974e732f951dc4b5346dfa0712b6f33d8868df76a62f25
-
Filesize
80KB
MD5101d5cd00c4defa5eeaa89725f7f0df0
SHA14fa0c6aed99fb5f63437ca7591a1e952b56bf285
SHA256262c8df6e40fb859d452bee94bca2726bedf0f6f8122890f3d4cb2186b1c97f3
SHA5120dea35cf236cac8ae34d6e71a1e5431b5f5cab5fbbc8d5ba808994c7383fdb722a3e7a28f3d2d83e42aad8843aa6adb75538b210ef79038fb1593228b1aea407