Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 22:01
Behavioral task
behavioral1
Sample
981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe
Resource
win7-20240903-en
General
-
Target
981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe
-
Size
61KB
-
MD5
1d429541a12776cd14dff027a4dbd4ff
-
SHA1
ccfc261cb2cd7e534957f8f90c1d6869a4ac3cd5
-
SHA256
981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9
-
SHA512
05c1ebaa68292a96ac52e4ede6524b1c3907d72e81c479bf842b0222bb30a5413ec3aef53eacbc3b389a24c57041d715876e326626c117dea59340dd069a7f37
-
SSDEEP
1536:ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZll/5/:GdseIOMEZEyFjEOFqTiQmPl/5/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2380 omsecor.exe 3048 omsecor.exe 476 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1980 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe 1980 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe 2380 omsecor.exe 2380 omsecor.exe 3048 omsecor.exe 3048 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2380 1980 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe 30 PID 1980 wrote to memory of 2380 1980 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe 30 PID 1980 wrote to memory of 2380 1980 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe 30 PID 1980 wrote to memory of 2380 1980 981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe 30 PID 2380 wrote to memory of 3048 2380 omsecor.exe 33 PID 2380 wrote to memory of 3048 2380 omsecor.exe 33 PID 2380 wrote to memory of 3048 2380 omsecor.exe 33 PID 2380 wrote to memory of 3048 2380 omsecor.exe 33 PID 3048 wrote to memory of 476 3048 omsecor.exe 34 PID 3048 wrote to memory of 476 3048 omsecor.exe 34 PID 3048 wrote to memory of 476 3048 omsecor.exe 34 PID 3048 wrote to memory of 476 3048 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe"C:\Users\Admin\AppData\Local\Temp\981937fdf4cd5ea4481013ddf1d3247faca74b0449477c1286a7aff2916125d9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD562a1de0ab68e289ed6c5e6e39f79ab4e
SHA192dbb49e36eb3c32de2bbed45412258e3d5422ab
SHA256afa7b5a6326712c5cb5dfda7aa0a9bc2586820977316f47700d73e9d525e1514
SHA512f23a2d444ae79ded95571562371a744ae0eaf42f4db3f22213d0ffe429061cc8b3c57bf7099ae838d62eb27e3a625c535763ea5e2f1d7d845c3deca4e29f23f6
-
Filesize
61KB
MD534902e65c60cccd1554a3baef05498d3
SHA1311e84ed7f8c034b5a630f27c4ac2bef8b1140ed
SHA256bc87954449a27bb9b64ad744a634ef31608d96c0346cab6f4b2fc6f33e654995
SHA5129e195766a6ac858056b3fdfe63029abe425f8f39aa45df56320a006e5a3f6dae9ab676073abb3a2ec3edf4720fa455f7ec6df68897b5202b060a2c15e50f142d
-
Filesize
61KB
MD53111bcf9bf3d9e8d4a1daa42c6778f22
SHA1c84d2fa7860488d504312fb36bfaa6dc95cacc0e
SHA256586839fdd752495d9637fc1aa4278a190cf7c8056899b379aa49376038b51a05
SHA5125076317db6f8517ae03232d0d7d305ee0eedb5b755f0de016d9a2bf9f2c384171936baae5efbcabc17d5b0cd76e2dbeda86357af7e0961916d835e498b54766a