Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 22:33
Behavioral task
behavioral1
Sample
3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe
Resource
win7-20240729-en
General
-
Target
3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe
-
Size
76KB
-
MD5
91d953c044dc1a1ef649690528fa0c74
-
SHA1
52bbf9c5d6b2b50ba1bd14b4b3057919b71d06e7
-
SHA256
3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871
-
SHA512
2ac2eb673a07c86629b9da68f20c8362d1f27070f2cc5abb703dd507fc476c3f36da055fea9019cad27d63bf8e917a42760232a94a76eb93249fb202f8435a39
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:cdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2708 omsecor.exe 1260 omsecor.exe 2812 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2432 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 2432 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 2708 omsecor.exe 2708 omsecor.exe 1260 omsecor.exe 1260 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2708 2432 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 30 PID 2432 wrote to memory of 2708 2432 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 30 PID 2432 wrote to memory of 2708 2432 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 30 PID 2432 wrote to memory of 2708 2432 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 30 PID 2708 wrote to memory of 1260 2708 omsecor.exe 33 PID 2708 wrote to memory of 1260 2708 omsecor.exe 33 PID 2708 wrote to memory of 1260 2708 omsecor.exe 33 PID 2708 wrote to memory of 1260 2708 omsecor.exe 33 PID 1260 wrote to memory of 2812 1260 omsecor.exe 34 PID 1260 wrote to memory of 2812 1260 omsecor.exe 34 PID 1260 wrote to memory of 2812 1260 omsecor.exe 34 PID 1260 wrote to memory of 2812 1260 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe"C:\Users\Admin\AppData\Local\Temp\3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD52e114bc1cc17202f90f7522e5e066560
SHA192b3f4b450e46a618c52890a803bd04d718ea3d5
SHA256ae47be47dc96de4bbdbe84f446bfbc0476760e20a3bd6b15734db7c2d28e7942
SHA51238c6a3654f328e6e40b81cf57f52cc79a771a423e4e229fd58bedda2fbc2a9f4eee96984499b87bfadbdcbe5fc519068791d8d6a1f21e3115d12d21b59d2d62f
-
Filesize
76KB
MD505cf8a28d7fffb9a1a75ad613206792c
SHA142c429b568ca682e5b2261872381ec911cfacac1
SHA256b26f6321614b143c90f7cb4f607ab56f7ee9989ffc6defd9e53518f3c5222305
SHA512e39c7d9aa0f379677790f5cbd946e53f33fe2a0c60e0bef5aab733ebf378d2dcbe1f1a89c8ef64fe15f28bc160406536095c0a26c67059fb26b0c07b05f2fa15
-
Filesize
76KB
MD5696386b52c09a097a36161ef7137479a
SHA1a8ed717763e73eb02c4aa8f8b7288ef2f0acb82c
SHA2569f426583c5f47423b28221b082848fcee477a8bf3f75918bea280739ab363d81
SHA5127d3d5ad7affdabb22d8c25c14891f9f6f1977999d22b109b8646131a831bdd264f13b29f44aff548b5d5c8fa46a5f2dd4c9344dfc1167bb1506a0fa9cdbecb20