Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 06:02
Behavioral task
behavioral1
Sample
8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
Resource
win7-20240903-en
General
-
Target
8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
-
Size
80KB
-
MD5
b4737e28abf9d45552e4aaef61991cec
-
SHA1
4bede00959e717060da43a28715e319d1497649b
-
SHA256
8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229
-
SHA512
7ad8a2aee743e9fc19c5250e0edfd016a53d4be45a26a2377c114b447d8887e5c05ed3e3d36bb8befa1b587f4b6ff4ec78bac6e2fe8f20e5f0649ba3f21f3ccb
-
SSDEEP
1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:gdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3068 omsecor.exe 2580 omsecor.exe 1108 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3008 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 3008 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 3068 omsecor.exe 3068 omsecor.exe 2580 omsecor.exe 2580 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3068 3008 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3008 wrote to memory of 3068 3008 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3008 wrote to memory of 3068 3008 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3008 wrote to memory of 3068 3008 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3068 wrote to memory of 2580 3068 omsecor.exe 33 PID 3068 wrote to memory of 2580 3068 omsecor.exe 33 PID 3068 wrote to memory of 2580 3068 omsecor.exe 33 PID 3068 wrote to memory of 2580 3068 omsecor.exe 33 PID 2580 wrote to memory of 1108 2580 omsecor.exe 34 PID 2580 wrote to memory of 1108 2580 omsecor.exe 34 PID 2580 wrote to memory of 1108 2580 omsecor.exe 34 PID 2580 wrote to memory of 1108 2580 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ed09572d90fc14dc1262625c1724232d
SHA1dd127b4cee5b83cc672b4a27cfa9ee93aa7d2736
SHA25695eed64b6f01f17077eb4d878df44873aeb55bbea041d7d8ce37d63651a4c619
SHA51284582265e814592929e369231c1bcc0fd6e41e14c08a08531cc839c4bdc3ab957886bb0a71344f96b3969aa53ff1e6a232aa20ba0b69aa78d1a0e07ca236e0cb
-
Filesize
80KB
MD558b64b842302b1a3035f16979efa7f68
SHA14121e800325b58d79cfe0c51d0cf08a5e50eacc5
SHA25623c815f671e71a8bbc9606121930b5d956f01b099ea7dbc0dc27c08536d6711b
SHA5126c86380cd9b0182e4a9a98ebf74e2c717cbeab6314e01e600ede659d5eeb1bf1b84910971e5f2875c664a11865b9e4591a19c5520e47154d0f0338b7740562b5
-
Filesize
80KB
MD5d948209db82f6e1e032e3a4447cad801
SHA11a358bc0da7eef81ad7be57046e5d96bde89de45
SHA2568f1673f3a2b38af849019799edfff2411434ad18759e53105145788e499297ac
SHA512afc6ad6add5ccf92b096291de49606834b00f276303dc4f7885767b5156e23391136bfef38a929d2667cd6e671773ade9bdfb8fd7a2b3dcb30510f2d37fc7c75