Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 01:39
Behavioral task
behavioral1
Sample
6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe
Resource
win7-20241010-en
General
-
Target
6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe
-
Size
65KB
-
MD5
3983c28b5ab092431ee841a66a2263fe
-
SHA1
3e8ae996204cd51bd84409aa7caa4887686a8bdc
-
SHA256
6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad
-
SHA512
e0295139af26b29dc01d8eff79cef2c77772f895949c8252866c0351da7010239cf1a4054cd28630e7aaee5f02272b421ab1fe7cbd33a3d46915449e1e039d47
-
SSDEEP
1536:Pd9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/HzG:ndseIO+EZEyFjEOFqTiQmRHzG
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2264 omsecor.exe 2616 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 2220 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe 2220 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe 2264 omsecor.exe 2264 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2264 2220 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe 29 PID 2220 wrote to memory of 2264 2220 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe 29 PID 2220 wrote to memory of 2264 2220 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe 29 PID 2220 wrote to memory of 2264 2220 6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe 29 PID 2264 wrote to memory of 2616 2264 omsecor.exe 31 PID 2264 wrote to memory of 2616 2264 omsecor.exe 31 PID 2264 wrote to memory of 2616 2264 omsecor.exe 31 PID 2264 wrote to memory of 2616 2264 omsecor.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe"C:\Users\Admin\AppData\Local\Temp\6228f05a90962298fb1a0cd477c8d7abfad523d298965562310b8556b596a8ad.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD56587d50f960c33ddc62233c26c98fcd7
SHA190d271edf241f2ae354c9af258bcb4b2475fd98f
SHA256e7e922d975c24534d213fb65b57541a6327c08ad0d9cac762b3b6c51013bcc5f
SHA512cbe3f19fa473dcbeeef9c02e1b783ff51cebc2cdc56f958ac881b4f137c167c28cdc01f9e444978d3b6c7d4a08d59072a8a9a85d88aaec2ffab36358871ed428
-
Filesize
65KB
MD51d8394f61c1acefbdffd3b20c6684e1f
SHA1ab9e40a58711bbf690c670b3ffb4438967de5fae
SHA2567e2620e4ea13e9d747112af1f7faf4f30845d8e5523795fb7c10baab1e622b33
SHA5123ab256618dae653fb028e32dcf5f548b8adb9dde17785475a4b3afece1e7af5ee6712fce110d13d41edfca84431b6b4ae677515e8383f7072399c2eac99dc75d