Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 06:08
Behavioral task
behavioral1
Sample
8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
Resource
win7-20240903-en
General
-
Target
8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe
-
Size
80KB
-
MD5
b4737e28abf9d45552e4aaef61991cec
-
SHA1
4bede00959e717060da43a28715e319d1497649b
-
SHA256
8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229
-
SHA512
7ad8a2aee743e9fc19c5250e0edfd016a53d4be45a26a2377c114b447d8887e5c05ed3e3d36bb8befa1b587f4b6ff4ec78bac6e2fe8f20e5f0649ba3f21f3ccb
-
SSDEEP
1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:gdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3060 omsecor.exe 1536 omsecor.exe 1140 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3012 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 3012 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 3060 omsecor.exe 3060 omsecor.exe 1536 omsecor.exe 1536 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3012 wrote to memory of 3060 3012 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3012 wrote to memory of 3060 3012 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3012 wrote to memory of 3060 3012 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3012 wrote to memory of 3060 3012 8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe 30 PID 3060 wrote to memory of 1536 3060 omsecor.exe 33 PID 3060 wrote to memory of 1536 3060 omsecor.exe 33 PID 3060 wrote to memory of 1536 3060 omsecor.exe 33 PID 3060 wrote to memory of 1536 3060 omsecor.exe 33 PID 1536 wrote to memory of 1140 1536 omsecor.exe 34 PID 1536 wrote to memory of 1140 1536 omsecor.exe 34 PID 1536 wrote to memory of 1140 1536 omsecor.exe 34 PID 1536 wrote to memory of 1140 1536 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"C:\Users\Admin\AppData\Local\Temp\8e2afcbd027d859d3e26e92333df55813879ea4472d300969e254a74e005f229.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ed09572d90fc14dc1262625c1724232d
SHA1dd127b4cee5b83cc672b4a27cfa9ee93aa7d2736
SHA25695eed64b6f01f17077eb4d878df44873aeb55bbea041d7d8ce37d63651a4c619
SHA51284582265e814592929e369231c1bcc0fd6e41e14c08a08531cc839c4bdc3ab957886bb0a71344f96b3969aa53ff1e6a232aa20ba0b69aa78d1a0e07ca236e0cb
-
Filesize
80KB
MD50dcf26c4e7fed26ef7427986f485bb0a
SHA1087f37368207c77e57d0f3fc440ff50dae19d9e4
SHA25660c3345fbed5c0c03d8cb388b4644ea4d9347156ffa220ee5829eba8b42ea741
SHA512db7e5512a0c768564cc3c879a5fa116c267b6b7244f9847402fe3b1cb1172717ba38bbf29aea743bdd8075543d6b9ae2d15bf2d6a40fcebc0c331404c3d678f9
-
Filesize
80KB
MD5f107b54f8aed02a1597e8d5574458aa4
SHA1b20d2da2e3971cfa696b4b96651bdc660812b196
SHA25628b3685eb288955f9a95c4ca721f2d70a21f01fac0ed7f5283f6d2c4da498b97
SHA512e29b4cf18f213c73c5e3493bce2fe02792b5b2ef09872d58cb0cd61c13b9e56c6c08380a1502e3794a5230da2dc68b289a0cfcb184a2f055ab6c046afd5eb78f