Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 11:07
Behavioral task
behavioral1
Sample
d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe
Resource
win7-20240903-en
General
-
Target
d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe
-
Size
76KB
-
MD5
5cc0cdf7bbc8751277deeda11a727f40
-
SHA1
05a026b8f2fe11ee58684bfb68f1d8c5416529db
-
SHA256
d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618
-
SHA512
4d1bf9fb3ce0a0bc94e051c5d22f70474e637bbe5c62bee20d1e5d94e1fa0166e75e23ed9777a4798683aac41290bc2fbced15aa5a487d6aec3d85eb28d52e2a
-
SSDEEP
1536:3d9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11f:/dseIOMEZEyFjEOFqaiQm5l/5w11f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2176 omsecor.exe 1472 omsecor.exe 2040 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2056 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 2056 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 2176 omsecor.exe 2176 omsecor.exe 1472 omsecor.exe 1472 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2176 2056 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 30 PID 2056 wrote to memory of 2176 2056 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 30 PID 2056 wrote to memory of 2176 2056 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 30 PID 2056 wrote to memory of 2176 2056 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 30 PID 2176 wrote to memory of 1472 2176 omsecor.exe 33 PID 2176 wrote to memory of 1472 2176 omsecor.exe 33 PID 2176 wrote to memory of 1472 2176 omsecor.exe 33 PID 2176 wrote to memory of 1472 2176 omsecor.exe 33 PID 1472 wrote to memory of 2040 1472 omsecor.exe 34 PID 1472 wrote to memory of 2040 1472 omsecor.exe 34 PID 1472 wrote to memory of 2040 1472 omsecor.exe 34 PID 1472 wrote to memory of 2040 1472 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe"C:\Users\Admin\AppData\Local\Temp\d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2040
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5562b7901bfb4334b3449e561adfafd19
SHA11de575b0b106328a4e9b6f06e9a2834a7b133bcc
SHA2565c26179f145419d124d38219240e31bff16a09e47217d3cb42e38ffe6fecdea7
SHA51231e4901b0880c6131cc745ee8782a6aceeaa747e6d393554cb7aef635556184e2a4dab468019a3d5600d7fc40c1e45119f52782ee8dafac14d90945b3ea32a61
-
Filesize
76KB
MD556a5d8eb1f9462f3b19d09aa12378972
SHA195dae94d4a1a02f2238b01885cd4531893d5ab57
SHA256e3c09339a6b0311eb41c64a4111d2e278a5996d5e675dea6021627666d655f55
SHA512ff48e776df7dd1205637dfec8498dcc229bc20e6fbc20f6e208f5faedfbdc758d50e632a6ebf3499dbdcab361ec4fee12446807eaa4465815a476ace45366841
-
Filesize
76KB
MD5230ea5676e13bb46b0e9c1142a8dcc6a
SHA13050ff628b5c8e01d650b33a3734da5ef060a938
SHA256132fdac4b653aa9bf0f43eb6ef507c96d8d094b72a62c705d986156f86151287
SHA5120d3f927d237268884e8cc3248c5498878f2d23ce6e5c46241246472cbe8550885e96d531f89265ea812d5e991897b822daa36b2d690325c4d9fb8f79f32e5ac4