Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 13:39
Behavioral task
behavioral1
Sample
01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe
Resource
win7-20240903-en
General
-
Target
01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe
-
Size
76KB
-
MD5
2582580e003af04158331b15b1cef3e0
-
SHA1
857f948c5a1913b5e3b13c310c0ee2411d771670
-
SHA256
01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162
-
SHA512
d02e96d347d0511717d3805a08e63a1c6d287e116e1761c06913f5a1644b8e0aa9cf4cf62500ecb2b49c3f52c9c2deb59ade29542dff69ee74208ff1f82c870c
-
SSDEEP
1536:9d9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11:1dseIOMEZEyFjEOFqaiQm5l/5w11
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2684 omsecor.exe 2868 omsecor.exe 2912 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2768 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 2768 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 2684 omsecor.exe 2684 omsecor.exe 2868 omsecor.exe 2868 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2684 2768 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 30 PID 2768 wrote to memory of 2684 2768 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 30 PID 2768 wrote to memory of 2684 2768 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 30 PID 2768 wrote to memory of 2684 2768 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 30 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2868 wrote to memory of 2912 2868 omsecor.exe 34 PID 2868 wrote to memory of 2912 2868 omsecor.exe 34 PID 2868 wrote to memory of 2912 2868 omsecor.exe 34 PID 2868 wrote to memory of 2912 2868 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe"C:\Users\Admin\AppData\Local\Temp\01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD523cadb559ce898e633546d41184c1527
SHA1e92f4a90953e4b180c6fb05fd64f127be11e82c1
SHA256ac28312c7d7703de7f29930fd86e6888fbb84027f54be42bbe2c81afbeb9c3d9
SHA512d12860890488c0a3938951f587bfde94d4195165f521c0f171fcb90abd78bf38159f2f9d0427637a1be8a13c8e9c7c40de20161991483564bfb3ca70260a2c7f
-
Filesize
76KB
MD58182a9b4093250759f6f0af30486c45a
SHA146791f10cd6cf259fe6841c748f2081c46885abf
SHA2567337796b5c383bfc4d712fe5ff61b54585e98d3b2f0d51a74123e5799278bbb1
SHA5128bc51f912ce9939725c628b29326694f7880a5330d66f6ade5c08bf55f806dc9c343c16b026f1a40788179364c80a9b7ef8259ebe26508833e228398c4359abe
-
Filesize
76KB
MD5de738ca6f9e86ca2ed0445f8dd0e5ecb
SHA1ccf0c0bafe356ff353efdb3f01b08c75621097bc
SHA25609569d9ad262147d2de9c4bf9376bcb9d6345dc48a265564dc2bafcc80bb9a21
SHA5121c3dae035dabcd69391602966b3147a18f8c8cf3009e4ac071666948b34ba63fe5dc2ea2b203f178010e2cd469ada9d683177cc58dbb4c1eccd9fc9ac1d90966