Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 11:06
Behavioral task
behavioral1
Sample
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
Resource
win7-20240729-en
General
-
Target
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
-
Size
88KB
-
MD5
089bc9c981a81ab3357819a123e11bf0
-
SHA1
387367183e3447e5bc9cb0cb05fd59cbe7631baf
-
SHA256
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362
-
SHA512
74938d6acf14e1f50f1d254e5de8dc19af4559b7cd11ee0a8a8e00a2ac488656862bcee8f931295febbc6476fe53718beccaf9f87a96a2ee0b2b4b7bae509209
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:RdseIOMEZEyFjEOFqTiQm5l/5h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1880 omsecor.exe 2016 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 2640 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 2640 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 1880 omsecor.exe 1880 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1880 2640 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 31 PID 2640 wrote to memory of 1880 2640 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 31 PID 2640 wrote to memory of 1880 2640 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 31 PID 2640 wrote to memory of 1880 2640 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 31 PID 1880 wrote to memory of 2016 1880 omsecor.exe 34 PID 1880 wrote to memory of 2016 1880 omsecor.exe 34 PID 1880 wrote to memory of 2016 1880 omsecor.exe 34 PID 1880 wrote to memory of 2016 1880 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD56274ecdc91c6bbd397d93bb6a5ceb6a4
SHA13316484db852f34636a6bca9f7bb8aeebe46cba3
SHA2565b8d5b0e4f89163c1e179e426d66587fbeef7b6bcdfba25c084a26b117cbad1f
SHA51279e71c9f6b5aa7637750c2f6d3172359f8caf4fa2f0e5bedf0ca9d2233c72f5695f17a5c6567f689df0daf101bc190ca88c94763cbe9ffe6dea3f9de481fc144
-
Filesize
88KB
MD50b0ac4ed117f89bda16d097d194a014c
SHA1596fadba308f36b0fb6e248f334db4f2edb3077e
SHA2562b6ed447e84811a52106abc259ba7ea6bfb6338f13f9d9f551ede751f5c40e8f
SHA5123543199ca870dd5491aefbd62bf9c16cf638ac0a679c21d33db61b1bd2f0af9f55fe0827345a00b0be750e43e29efa775e140a21dce5a13dae3439276a265f4e