Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 19:28
Behavioral task
behavioral1
Sample
83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe
Resource
win7-20241010-en
General
-
Target
83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe
-
Size
71KB
-
MD5
7e3b7e1fca898cc8eae52c97f52e28e0
-
SHA1
3bd3ef24fdef703122450397d7a385fdeee76b78
-
SHA256
83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8
-
SHA512
394d7b5612f6685ec7d75ae17657645187f5822f3f3c091566401cc8ce099830c86278c5e96f12fb13c0c9402568873e3b642dafe02555715ccc8a7e81e052f8
-
SSDEEP
1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:XdseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3016 omsecor.exe 1864 omsecor.exe 2964 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2236 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe 2236 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe 3016 omsecor.exe 3016 omsecor.exe 1864 omsecor.exe 1864 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2236 wrote to memory of 3016 2236 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe 29 PID 2236 wrote to memory of 3016 2236 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe 29 PID 2236 wrote to memory of 3016 2236 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe 29 PID 2236 wrote to memory of 3016 2236 83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe 29 PID 3016 wrote to memory of 1864 3016 omsecor.exe 31 PID 3016 wrote to memory of 1864 3016 omsecor.exe 31 PID 3016 wrote to memory of 1864 3016 omsecor.exe 31 PID 3016 wrote to memory of 1864 3016 omsecor.exe 31 PID 1864 wrote to memory of 2964 1864 omsecor.exe 32 PID 1864 wrote to memory of 2964 1864 omsecor.exe 32 PID 1864 wrote to memory of 2964 1864 omsecor.exe 32 PID 1864 wrote to memory of 2964 1864 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe"C:\Users\Admin\AppData\Local\Temp\83c09e8c0d8765cbd46b56b0047133ce8e2743dc909e8b31ea216653f5912dd8N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5b18f23576c938ef8b35e485c390a7fce
SHA11d3ec612c7d5a63701c066df5165d3345967244e
SHA256592328913048ca59b8a09a0440cac009771946de35a4266794d9e27243ae8163
SHA51278a3c736deeea93e2c6b16a488c68c6b2ae3016212bb4c4fd09f94a66b659ca82995ed0e9245ceb81e6ec6fcccb8685e3b2a3d87708a976512653ba81c449053
-
Filesize
71KB
MD576585528f23b5eda065da88299b6d9da
SHA1bdc9359139a628a165226b0ad3a0f6d28ab1d6e5
SHA256ef8183514f602a760e2af89982510bef33d84d9aea496572878891ffac4a1c70
SHA51223198c8dbb01fad572e2415b6693aa7a83f775793fd7aa4dd4cc151241ba9f8c5691feb95e2a3991b55945fff3a4517c8883bfb871abf6a347e741e606d4cd88
-
Filesize
71KB
MD59d6f12f0c22863bc3b63c70bcc301e4f
SHA1844695a9574676fce4ba44c7811a29a318a7b82c
SHA256bd88da7c21e214221dd2cb40f952acde5919d09ece3b5f7c518a2107085f5482
SHA51258de5c95e7e6626682f89b53e8a96ee6ff36811ae3fe5c2726815e37145011678f3d6513097aee03ec2ebb669ef0e759bbaf63dc83177d9f1b074c3aa65de0e8