Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 17:47
Behavioral task
behavioral1
Sample
c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe
Resource
win7-20241010-en
General
-
Target
c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe
-
Size
72KB
-
MD5
81dffcc978e4fb925e61accb421f7ae0
-
SHA1
b9614d881fbf42c234272ba91063340f394ab7fc
-
SHA256
c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68
-
SHA512
2a81dc6a9dee27965042a800df6ee6a316398a39d06c552368a3e9b3cafb93fc9aebe4c48fe721578e4db5fcf94d63a25b312fe8a9778155e7dfbfa2a5f0f038
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211P:idseIOMEZEyFjEOFqTiQm5l/5211P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2472 omsecor.exe 2396 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 2768 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe 2768 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe 2472 omsecor.exe 2472 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2472 2768 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe 30 PID 2768 wrote to memory of 2472 2768 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe 30 PID 2768 wrote to memory of 2472 2768 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe 30 PID 2768 wrote to memory of 2472 2768 c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe 30 PID 2472 wrote to memory of 2396 2472 omsecor.exe 32 PID 2472 wrote to memory of 2396 2472 omsecor.exe 32 PID 2472 wrote to memory of 2396 2472 omsecor.exe 32 PID 2472 wrote to memory of 2396 2472 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe"C:\Users\Admin\AppData\Local\Temp\c1a82d38f06663a6fab134b570d484c13dac7cb3a8223ad6aa56d9db818bab68N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2396
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e4ecff39bb0a9bf4f4fc37f1410c6b89
SHA1b970ada909a8515b86c74f8e4560b6c49d7ff013
SHA256cf0bb30ecebee08ea66266d75d0531d44b62227ad3d19e3dc7eef4f200d70b19
SHA512b943dc539426df4abb39887a9b48ededbf349783d0b8a0e4c6ef5894f550cf4a21fedffd2023ebd18e1a8fd9b4adb45381b0875913c4a8852a79e0282f2e225b
-
Filesize
72KB
MD5bc00396275ff0f73843f46231698b3d0
SHA100db4cdab860266fc83a0335f85363ab9ee77fb3
SHA256f5a03d20cd83a6f820728761093511f2e795eae6de222f09410cf8204bfa700d
SHA5125433f9bfeb50e5c6ec47699b4e221c7f3887589c54eda5d8bbcf009dbfd3a62ac0861db270a7760ca293c915697029bda91bc2a63a692b83019af7765a188b3a