Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-01-2025 10:52
Behavioral task
behavioral1
Sample
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
Resource
win7-20240903-en
General
-
Target
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
-
Size
88KB
-
MD5
089bc9c981a81ab3357819a123e11bf0
-
SHA1
387367183e3447e5bc9cb0cb05fd59cbe7631baf
-
SHA256
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362
-
SHA512
74938d6acf14e1f50f1d254e5de8dc19af4559b7cd11ee0a8a8e00a2ac488656862bcee8f931295febbc6476fe53718beccaf9f87a96a2ee0b2b4b7bae509209
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:RdseIOMEZEyFjEOFqTiQm5l/5h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3004 omsecor.exe 2704 omsecor.exe 2516 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2816 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 2816 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 3004 omsecor.exe 3004 omsecor.exe 2704 omsecor.exe 2704 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3004 2816 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 30 PID 2816 wrote to memory of 3004 2816 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 30 PID 2816 wrote to memory of 3004 2816 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 30 PID 2816 wrote to memory of 3004 2816 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 30 PID 3004 wrote to memory of 2704 3004 omsecor.exe 33 PID 3004 wrote to memory of 2704 3004 omsecor.exe 33 PID 3004 wrote to memory of 2704 3004 omsecor.exe 33 PID 3004 wrote to memory of 2704 3004 omsecor.exe 33 PID 2704 wrote to memory of 2516 2704 omsecor.exe 34 PID 2704 wrote to memory of 2516 2704 omsecor.exe 34 PID 2704 wrote to memory of 2516 2704 omsecor.exe 34 PID 2704 wrote to memory of 2516 2704 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD56274ecdc91c6bbd397d93bb6a5ceb6a4
SHA13316484db852f34636a6bca9f7bb8aeebe46cba3
SHA2565b8d5b0e4f89163c1e179e426d66587fbeef7b6bcdfba25c084a26b117cbad1f
SHA51279e71c9f6b5aa7637750c2f6d3172359f8caf4fa2f0e5bedf0ca9d2233c72f5695f17a5c6567f689df0daf101bc190ca88c94763cbe9ffe6dea3f9de481fc144
-
Filesize
88KB
MD5236f73b5d22b99388a119707c5286172
SHA1f3f86160a75a65d39b22f2a7d8714a85a3189281
SHA25673237cdb0e28316bfd01b12044485a8298ef0d4a69719ee1f0f9322e6496c0b4
SHA5126ec3afc03b1a75116e141ec19db0b15e05bf29e3048857a533ffbb809117f64dd45ac283182d84c38549f1c79ac2c256a4373aab0efdbf6d4b643fd81d9b394f
-
Filesize
88KB
MD53b99c82f2929dc29512e0171b69889b7
SHA17164c3ca74daac8ed9f6b1a1d5ccc9ba1cc58744
SHA2568b40fb1237598032004099c358f613f57a11dc0a30943a6a4f2f7f6e994c13a0
SHA512d8c73ff356ead67ee77e7601124059e3419ec261f822dde5cbd6dab0d94871cfd2f9e915257f7257e1f96026b1362965aa0938b54286d59986fcf780a0073efa