Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 22:20
Behavioral task
behavioral1
Sample
a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe
Resource
win7-20240903-en
General
-
Target
a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe
-
Size
89KB
-
MD5
d4982f12d75480793c716cb83b68012a
-
SHA1
aff01301f46f20d0e8bc54ee554d26c6cb21f129
-
SHA256
a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb
-
SHA512
8849be50401eaf11211f5cf9c0ca8bd313256db72cf6a7fac3119d656093ba86f7376525f5f08813c33fa0df6a6f344760c71f757ca80f915eadee3791e66422
-
SSDEEP
768:4MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAP:4bIvYvZEyFKF6N4yS+AQmZTl/5H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2808 omsecor.exe 1928 omsecor.exe 712 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2744 a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe 2744 a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe 2808 omsecor.exe 2808 omsecor.exe 1928 omsecor.exe 1928 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2808 2744 a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe 31 PID 2744 wrote to memory of 2808 2744 a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe 31 PID 2744 wrote to memory of 2808 2744 a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe 31 PID 2744 wrote to memory of 2808 2744 a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe 31 PID 2808 wrote to memory of 1928 2808 omsecor.exe 34 PID 2808 wrote to memory of 1928 2808 omsecor.exe 34 PID 2808 wrote to memory of 1928 2808 omsecor.exe 34 PID 2808 wrote to memory of 1928 2808 omsecor.exe 34 PID 1928 wrote to memory of 712 1928 omsecor.exe 35 PID 1928 wrote to memory of 712 1928 omsecor.exe 35 PID 1928 wrote to memory of 712 1928 omsecor.exe 35 PID 1928 wrote to memory of 712 1928 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe"C:\Users\Admin\AppData\Local\Temp\a314a6b8b2b9441fdcb3ec7905ca7b3b3d877bc485870e023a580dae7569f1eb.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:712
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD544decfb986f53671f572de1ca9beccee
SHA13a796d9d7aa6e58b24d3e8b40e0fa1f3b1d48677
SHA2563df5f0cd4ee1155f59525f97ed0bc549b371cd88e8d3f55e34b2a90256311830
SHA512cc3c7fcd0c8f9c4d9ed8e265131b33525258943b2f6c33a386e2c977efa2d2ef42b55109fe1af79583a1b6e4f29107ed8e2de77180800facd2fb11967485b1e0
-
Filesize
89KB
MD5fe033a34049c5d0756d3328fac603573
SHA16a5a8c10c2afd4c3948d44bee1144a049890eebf
SHA256e74fe769d5a5dbb27607b96c20e378fa45cdb1fb761d8410f58ec4e3283cea7f
SHA512d1e8aa215b1ce60aeb2838c51c745eacd8831b9e7c87962b5b33b6473d36fb037ee8c6ad4a12058d99a4a419269b15f7b472867d34454b8119d2e6b825c3ff6d
-
Filesize
89KB
MD5db8f9d8fc1b0d2c12d4f153aeaf336e6
SHA1d7418e3fe08749c5ba36ca86f7da6f18e1e0e5e1
SHA2569e8989859f7b01ce08a37da2911ac49ff61ba6f7a163af142fa19ff6f198369e
SHA512c79af64aec8086698e662e823d0c867dd046ee05d8f48a7d2765347a8f3b267e85d5d32ec94ba9c7873569a46431e7bf43dd2a2bce44932b7c61d93c71054e42