Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 04:33
Behavioral task
behavioral1
Sample
b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe
Resource
win7-20240729-en
General
-
Target
b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe
-
Size
88KB
-
MD5
a097be328eb9231d136ad6df8ef684b0
-
SHA1
4fcf756ab596072f42f1582f1e9d7c05e5d832a1
-
SHA256
b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89f
-
SHA512
5d6a9b70dd20070edd00ebfc3c6813dab12dcc0ffb4d9866f8c5ae16d51a4698cec78789399723a8a665d0069f9037ca6c17308f67240d602ede9c61dbea8dfd
-
SSDEEP
1536:1d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5r:9dseIOMEZEyFjEOFqTiQm5l/5r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2680 omsecor.exe 1684 omsecor.exe 864 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3028 b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe 3028 b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe 2680 omsecor.exe 2680 omsecor.exe 1684 omsecor.exe 1684 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2680 3028 b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe 30 PID 3028 wrote to memory of 2680 3028 b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe 30 PID 3028 wrote to memory of 2680 3028 b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe 30 PID 3028 wrote to memory of 2680 3028 b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe 30 PID 2680 wrote to memory of 1684 2680 omsecor.exe 33 PID 2680 wrote to memory of 1684 2680 omsecor.exe 33 PID 2680 wrote to memory of 1684 2680 omsecor.exe 33 PID 2680 wrote to memory of 1684 2680 omsecor.exe 33 PID 1684 wrote to memory of 864 1684 omsecor.exe 34 PID 1684 wrote to memory of 864 1684 omsecor.exe 34 PID 1684 wrote to memory of 864 1684 omsecor.exe 34 PID 1684 wrote to memory of 864 1684 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe"C:\Users\Admin\AppData\Local\Temp\b3631affd7bdc141d454486540889437e0b243dbfb10ea8d9fcccfe67954c89fN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:864
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5fe87e99998c96f2e97cd55b1eae62b59
SHA1c22ccd06477e93ea6f6d741341256c64c6281519
SHA256b22d4b5bc760bd640c289e08330cda2873c933329fd6fa93dfab411fe98b1673
SHA5128134fa8ebb24c495cf50ce0364b6478c782cf9e5d388342e0743034b28a2d1d20c3ee53a0e98446db5040edf6e537a76771c6eadd223e0895f3911a2208e3b3d
-
Filesize
88KB
MD510b4f8678b21542f47a6afa45189b690
SHA1b46694f83df8bb414801f2a8f1c3ef833b030fa1
SHA256c3d114566cb9dfc360119b0995b9d8eabee6d6d32e8f2bf109842765df5f4b3c
SHA512cc970667d68fab88c9937a0b1170dc494e7c15326db3b45861e8fd956da6353fb900ca212eac97c7825ba6720549fcc78217326d92764a672317fa8677b49e44
-
Filesize
88KB
MD54ad0786c8df1b340c7e27c213f69a88e
SHA1cc0ca3215315da90f9296c947c7b8a3bd30827b2
SHA256815cceab668d5f19294db8147bbab3d970628faf7a890cccf78f218045a0cfc1
SHA51220244ad0db7268d1dcf1b7b74a4244dd1c4a60e72ed2bd97d37143c062126cd5058174999bd37883077cce9aeb03ebac5d33c4d05306c6f773f38104398447f5