Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 07:38
Behavioral task
behavioral1
Sample
c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe
Resource
win7-20240903-en
General
-
Target
c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe
-
Size
89KB
-
MD5
74e3d8a305751a63ac4b15e00fc256f8
-
SHA1
e98f0a50e1b7017270537a1262a76a353be283fd
-
SHA256
c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426
-
SHA512
decf2cc0505f0c26c5408b3b8cfec436c97869ad33e58fe5d9e4d9ceea4b761c3a3414fde0c85e7b8491d4c54b3109b87806672b82fc1c165e5ce680aa6118ea
-
SSDEEP
768:tMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:tbIvYvZEyFKF6N4yS+AQmZTl/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2084 omsecor.exe 852 omsecor.exe 1824 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1924 c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe 1924 c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe 2084 omsecor.exe 2084 omsecor.exe 852 omsecor.exe 852 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2084 1924 c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe 30 PID 1924 wrote to memory of 2084 1924 c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe 30 PID 1924 wrote to memory of 2084 1924 c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe 30 PID 1924 wrote to memory of 2084 1924 c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe 30 PID 2084 wrote to memory of 852 2084 omsecor.exe 33 PID 2084 wrote to memory of 852 2084 omsecor.exe 33 PID 2084 wrote to memory of 852 2084 omsecor.exe 33 PID 2084 wrote to memory of 852 2084 omsecor.exe 33 PID 852 wrote to memory of 1824 852 omsecor.exe 34 PID 852 wrote to memory of 1824 852 omsecor.exe 34 PID 852 wrote to memory of 1824 852 omsecor.exe 34 PID 852 wrote to memory of 1824 852 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe"C:\Users\Admin\AppData\Local\Temp\c6164c96940570a1e87dbdbc91c615e79af75379007f3246135b587386089426.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5d6b8e6dc9df48671f1169b1c867fa185
SHA1f81da4fc3038388200fd01cd91d2d8541b995724
SHA2567fc929bdd750bb0068f596c7a5f95e4a75870f7d9b0603315071fad58b4a963e
SHA51232ba1351adf71ef7c71e5e8f15838ed863898a5d519a520491508099f0f3ff4591fb0b1cd3ed1c3ccb6c44975f45a9b5e08116f70cab3f4433b9195a63bdcbe5
-
Filesize
89KB
MD5740ba1cdc833a7d05fa8b6fdb730fb49
SHA1c85e617bd16fe47ca4c494e5496c063ff215cf07
SHA2563cd825d40f7a4ef38a0f30f5fab4202f259fddc36b6dfa6adacc52f369b8aef2
SHA512b787ee126cb1907931f85b83808f9b16a096704a9ea391d634d72f416cdd571904978a02272fe9125bb89ba8bbeb2ff71a63843fbe39ef2a66921eccb7201e58
-
Filesize
89KB
MD5c55939ca6fa85d71b4a1f0dcee67ea5f
SHA17124061f24ea649ed1069850ce8f227c9acb57d7
SHA256363073087225194427a5bbb9b09ae3d3bdd9d27db6feeea8ca25528d95f647e9
SHA512664aa9cb31fbfffb97793eb3246f928780c68ff9d535a7070f4d0e4ab9bb4bed6d4d74beaab91a2b6ca912dd2c551fa03e75e33e308f1c04e209b240b2fe5755