Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 08:22
Behavioral task
behavioral1
Sample
9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe
Resource
win7-20240903-en
General
-
Target
9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe
-
Size
61KB
-
MD5
26c37b97ce88d2b4baf9507d82ba4730
-
SHA1
89e887acdf20815186546d8e33ebf313787e0216
-
SHA256
9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210
-
SHA512
e38e37c095a1167842fef207a24846f57791abf51d065e72bae6605775ff1159df079d1c95b407e69fb0e5e9334abf16c84de6d40ae3e84a39ab659cc2151efc
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5:edseIOMEZEyFjEOFqTiQmTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2564 omsecor.exe 2592 omsecor.exe 2600 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3008 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe 3008 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe 2564 omsecor.exe 2564 omsecor.exe 2592 omsecor.exe 2592 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2564 3008 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe 28 PID 3008 wrote to memory of 2564 3008 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe 28 PID 3008 wrote to memory of 2564 3008 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe 28 PID 3008 wrote to memory of 2564 3008 9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe 28 PID 2564 wrote to memory of 2592 2564 omsecor.exe 32 PID 2564 wrote to memory of 2592 2564 omsecor.exe 32 PID 2564 wrote to memory of 2592 2564 omsecor.exe 32 PID 2564 wrote to memory of 2592 2564 omsecor.exe 32 PID 2592 wrote to memory of 2600 2592 omsecor.exe 33 PID 2592 wrote to memory of 2600 2592 omsecor.exe 33 PID 2592 wrote to memory of 2600 2592 omsecor.exe 33 PID 2592 wrote to memory of 2600 2592 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe"C:\Users\Admin\AppData\Local\Temp\9bb28f92a2bea31b35442f427e6ef58b8cfa60cf27a2e67939449a1f27d86210N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD54dfb6d807a2481e4ebaae24bcbaf4907
SHA1cd82ac4b6a414ec505936dd13a3234715a954172
SHA256fd6242bfc27a183a3b15619f5647e181daac70439ea15ba17cdcdc50e7cc224b
SHA512dcc29fec3383e733282684163ef5195494dca8bc4fbb21cc5bc8f98c139a6a7b8035e44ea9a0a348dd698ec8875e257cd89215f6d6cac07efa900c10b5d42cb4
-
Filesize
61KB
MD5031b2e051995049aa63f2c4562b16308
SHA1753387dfdb6e95c1ff72373dff53c495ce025b21
SHA256349b07ee310f75136753333f1d211e0e91f747a591a00e8516ea4c4f648b5d8f
SHA5125dd2f5ab2ff977ef950f7cc232890793e3151337eb96fd0b22e24c6d663d4634f8e8d0c55284d75660b92b99cdf4cc831be18e6a9bf4e1b25c6df1525b141497
-
Filesize
61KB
MD5b3df035faf345a943e7cae0a1cabaf0a
SHA11b1a9b08c4b4703910b905675dfb3288c2af3787
SHA2569527ec6f5bebc0c5deabe0da8d02b4456a7195058550656a859812522f631ae8
SHA512e563ac0ac069433134ffa8e033dbea43e13c8e8ffbe334c1535ecd0f7bd012040c9f70cc7dda5575d5227ae14c6c075fc449c64a47c1c2af1bd049788a68ad3a