Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 10:19
Behavioral task
behavioral1
Sample
fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe
Resource
win7-20241010-en
General
-
Target
fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe
-
Size
90KB
-
MD5
d6751aa4248926f54bc9588bc65e4a1c
-
SHA1
3715e109a6275482254c3f0913eda579110466be
-
SHA256
fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629
-
SHA512
1a97366ab41e8ad1a13396eb95d6018487f90f2fab668dd3cfe9263a807de6154cc6e12b6c5bfbea481825087ea639dcc4695ea3bb38028e7a39d214c62af2b4
-
SSDEEP
768:FMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA+:FbIvYvZEyFKF6N4aS5AQmZTl/5W
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1128 omsecor.exe 2992 omsecor.exe 2740 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2116 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 2116 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 1128 omsecor.exe 1128 omsecor.exe 2992 omsecor.exe 2992 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1128 2116 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 30 PID 2116 wrote to memory of 1128 2116 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 30 PID 2116 wrote to memory of 1128 2116 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 30 PID 2116 wrote to memory of 1128 2116 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 30 PID 1128 wrote to memory of 2992 1128 omsecor.exe 33 PID 1128 wrote to memory of 2992 1128 omsecor.exe 33 PID 1128 wrote to memory of 2992 1128 omsecor.exe 33 PID 1128 wrote to memory of 2992 1128 omsecor.exe 33 PID 2992 wrote to memory of 2740 2992 omsecor.exe 34 PID 2992 wrote to memory of 2740 2992 omsecor.exe 34 PID 2992 wrote to memory of 2740 2992 omsecor.exe 34 PID 2992 wrote to memory of 2740 2992 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe"C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD57d3a37876afdb630ef3e8d18bace8aec
SHA10d4d8887804aa168bca57e0842fe7df2752a21fc
SHA256240ac3b87a133772d045e0de7096db649ea1a7c6dfc849cdfa0ae0a7e4f95e6c
SHA51277464004e1541de33a738956757c2b9622f2221d5712ec0349339cfaea13a2c6debb7241f96a6f5a3c7a83d2994bd652cf02213c5a2484e53545605c321044e1
-
Filesize
90KB
MD554e2f1d9bce299a74aa6d5de8bc5709b
SHA1074f8835ce99ad71ee2c741ba43bd9f435d6905d
SHA256c535a8710a27c0b37f85e2cc4cdb25aa2f3d3b5ad9828fc7fa24219c29cdf5b3
SHA512f40a40d281e01a39efaa7946f7c102c9822d01f85d45edf644eba409d8e95ef7251c0181bd95722695af014b04ddce974bea62824f9f840f2f989c5ae40e632e
-
Filesize
90KB
MD54f0eb7321e0390462517c943db2f69ab
SHA1e50077db889597b9686afe76f61a401a4daeae12
SHA256b3618433c48572cf185014f3ce7a4aab0f4ab5ef06956599458a6bf2a6408252
SHA512ee18500f5d63e16a8542843427e54bba5152619f20089c5289a268edab520832de470e92db32e0116aaa4cad76a84ad727b17ea3c23602a4665e43ae14f89a26