Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 02:40
Behavioral task
behavioral1
Sample
756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe
Resource
win7-20240903-en
General
-
Target
756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe
-
Size
61KB
-
MD5
8e3f6e1752bd2edfac4e3513c57d8389
-
SHA1
94d27ce598f52398a8e45901151744eb4e70a7d2
-
SHA256
756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31
-
SHA512
f061755a6b6676bdcedcb21df81238e1ae521fd3c81cf8142f6d532027192682b9742931e02b8312b75985d94425399657836c19379ba1a432212e9fadfc91a5
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5:7dseIOMEZEyFjEOFqTiQmTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2276 omsecor.exe 1484 omsecor.exe 2812 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2284 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 2284 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 2276 omsecor.exe 2276 omsecor.exe 1484 omsecor.exe 1484 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2276 2284 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 28 PID 2284 wrote to memory of 2276 2284 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 28 PID 2284 wrote to memory of 2276 2284 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 28 PID 2284 wrote to memory of 2276 2284 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 28 PID 2276 wrote to memory of 1484 2276 omsecor.exe 32 PID 2276 wrote to memory of 1484 2276 omsecor.exe 32 PID 2276 wrote to memory of 1484 2276 omsecor.exe 32 PID 2276 wrote to memory of 1484 2276 omsecor.exe 32 PID 1484 wrote to memory of 2812 1484 omsecor.exe 33 PID 1484 wrote to memory of 2812 1484 omsecor.exe 33 PID 1484 wrote to memory of 2812 1484 omsecor.exe 33 PID 1484 wrote to memory of 2812 1484 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe"C:\Users\Admin\AppData\Local\Temp\756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f87e7731cff76a303f2775b6f814ca83
SHA1f9af87f2b3d91340c4b63d9f719e968005d89a50
SHA256e0d0f8c6487cb5c4ea31f5b6c1f76dace55003b30330e634570068526689407e
SHA5121cae476a58d8a0aa56677ca70ae4ab19e3a12a088e14ac32e992ad8c4432cbfa8ee6ff9e897e7a72b9a44ade55e0bb39b2770711d0296fb5f6dd72afecf4a613
-
Filesize
61KB
MD596dfbe7737f52a84b9db551f2bad3b8e
SHA1dd1a156cc633912b682600ec511ef6606a0196f0
SHA2567696d328368611959a4de430a1c5bfcacac3b6cc7ed6481590d8709759d19b00
SHA512defde71a15e2450da80aab9dc1f084f92400aac44aee3cbc6c0d4b86dd77e437de5c9eea52d69a7f1f944f2228e5271aea93ffc2d22f354edeb9359c04d07353
-
Filesize
61KB
MD5637058671b106f7bce539325e7b08444
SHA15e87645074cc11f475a3ecd40c892e8782dc498a
SHA256aca7cd26402e5369bfff6a7da6d946a06b8f0b0dc762857fc62fe721aa0d1270
SHA512eae16e8067a2f94be4d2f8fe331a1c9166cda7c177ef33497fefd1a136a41cea33c3ae1dc88ee25fd884add9def8d591f9b4542758575d96483ba6a682b7a8ab