Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 12:26
Behavioral task
behavioral1
Sample
ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe
Resource
win7-20240903-en
General
-
Target
ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe
-
Size
80KB
-
MD5
aa2c94b3d28aaf7ca6f821fa6af68f60
-
SHA1
3a027ee21bfcef356014604a39f98c7e43a596e6
-
SHA256
ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0
-
SHA512
138f2c981bdb55cdb68cc51de351bcec33a94fe3dce26e038af43ca4515df9853db03782002a02ab54476b5a4bc748111a30abd29d6bc05a296d83c1b5bd48c9
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:TdseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1684 omsecor.exe 2944 omsecor.exe 2864 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2480 ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe 2480 ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe 1684 omsecor.exe 1684 omsecor.exe 2944 omsecor.exe 2944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2480 wrote to memory of 1684 2480 ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe 31 PID 2480 wrote to memory of 1684 2480 ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe 31 PID 2480 wrote to memory of 1684 2480 ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe 31 PID 2480 wrote to memory of 1684 2480 ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe 31 PID 1684 wrote to memory of 2944 1684 omsecor.exe 34 PID 1684 wrote to memory of 2944 1684 omsecor.exe 34 PID 1684 wrote to memory of 2944 1684 omsecor.exe 34 PID 1684 wrote to memory of 2944 1684 omsecor.exe 34 PID 2944 wrote to memory of 2864 2944 omsecor.exe 35 PID 2944 wrote to memory of 2864 2944 omsecor.exe 35 PID 2944 wrote to memory of 2864 2944 omsecor.exe 35 PID 2944 wrote to memory of 2864 2944 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe"C:\Users\Admin\AppData\Local\Temp\ce0b4bc04397fc3758d1771743ab780c223dccc5568314322f3b2a6d89bebee0N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD59a3f4ce053739fbe71656b440fb05fd6
SHA11e38e301a217e1f8656d20a04347ac6996e22df5
SHA25676c5433de52b898b3fd7bf9b7b7f460ac97b1cc453908d097227720dd764ce89
SHA5125446f6b4467dab9b8606ac605959cf677c0ef8a1b1592002b49c58fe6eebbe1c0862d362b3c40d3d1c24f47327d7ae77e4614a692706651a60e69634c094590a
-
Filesize
80KB
MD58c042f3d29c878774623da9f8c8cb9b7
SHA15c0f73e8909bcc930d3b67bafd78d09ebdd21413
SHA2564cbc1690e37e27e1717fad32aa9e5a1e91bad63c1ad30c3ed2c662cd5413aec8
SHA512bfb1bffaaf343d968b245612b64bfe957841b751c6008b906dd0a84722383ae197be41158002462b937320c280868532571369c2cfedae9c70f263baa0b08981
-
Filesize
80KB
MD5de3b5c1d0473b827ce2d3b4b625f4e19
SHA125426a2d493983891d583c7fbd97e50a5f57c23e
SHA256286080a97a9f60a5723228a7dc7f78b286ed685d27afac3bf5df89b1fc549339
SHA5123bc8a1efeeb12036be3e7661c324701712b0b1a21ac63b30efe64f5d656e7b9cd7deb06913f0dc2ac7694395c48f58a3cd206376a28886277b95daee30857347