Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 06:16
Behavioral task
behavioral1
Sample
b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe
Resource
win7-20240729-en
General
-
Target
b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe
-
Size
76KB
-
MD5
7558ffb530e028c740a509698c85c257
-
SHA1
4d716b78cf0fb491b10e7523b51f793f69d7ab6f
-
SHA256
b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8
-
SHA512
13aca0ec59c3a1d9c0f117f63d8dd62040df2580f88721246a1ce0511afc344e64dc49c18ddf32ced7ba0b4d36639949fdbc37790d767f25a05d20f4d3af0182
-
SSDEEP
768:BMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWZ:BbIvYvZEyFKF6N4yS+AQmZTl/5OZ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2364 omsecor.exe 2028 omsecor.exe 1044 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1440 b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe 1440 b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe 2364 omsecor.exe 2364 omsecor.exe 2028 omsecor.exe 2028 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1440 wrote to memory of 2364 1440 b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe 30 PID 1440 wrote to memory of 2364 1440 b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe 30 PID 1440 wrote to memory of 2364 1440 b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe 30 PID 1440 wrote to memory of 2364 1440 b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe 30 PID 2364 wrote to memory of 2028 2364 omsecor.exe 33 PID 2364 wrote to memory of 2028 2364 omsecor.exe 33 PID 2364 wrote to memory of 2028 2364 omsecor.exe 33 PID 2364 wrote to memory of 2028 2364 omsecor.exe 33 PID 2028 wrote to memory of 1044 2028 omsecor.exe 34 PID 2028 wrote to memory of 1044 2028 omsecor.exe 34 PID 2028 wrote to memory of 1044 2028 omsecor.exe 34 PID 2028 wrote to memory of 1044 2028 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe"C:\Users\Admin\AppData\Local\Temp\b2962cf9b86a136790359f6c49096c8505f83dc44defdd34284b69b025e46fb8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD50563ba8dfff8d6ff48c05b27bcc36eed
SHA13c4f91d3988992ed9e2913979093a3d14fb4b75c
SHA25657cd373c28d36bb286c2723c00212bf8f8dde8909cf60f5787a07c0a6f608376
SHA512f3d2b2d7c17a0e5c56bad4854ecbb2ee29ba73489fe2438d9d3fd6e399d57964aae989d811030b17a42962868978e409dac582802f2c786c881518371a44e5cd
-
Filesize
76KB
MD51e8668d71d20ecaf218dc93188ed0a40
SHA1c0ea35de324d5a04c7a4969af4f66cdda26453d5
SHA256d8ff598ad81a892e2ac18f9d364567a0caf74178e5a22c99896fa6f937f71f08
SHA5122fd7387429435e51693f7372b52d04bc59fb03bdf17ce5569034b9224c182ef8ec6a277d475390379ae59bf0e3201aa82501ef36efa21f21a907c020afc23f59
-
Filesize
76KB
MD56f074ae01ab602e64f84688caa02d0e4
SHA17f062eedc4886ef43d61a0d3fd24580b1092c423
SHA25687b91579d1f9ee42fbe74445fa47665fa74d413abb694c8e2a3e6554487d709b
SHA51219adcfd8e6378067d2fe86156600d227f7a778bfc0f6fead0bb096a80e68d9736510d22da05adcb9d878ef33c61d3ea175668e0d1c059581c14f83d75605df47