Analysis
-
max time kernel
115s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-01-2025 07:57
Behavioral task
behavioral1
Sample
e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe
Resource
win7-20241010-en
General
-
Target
e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe
-
Size
72KB
-
MD5
b9630713921daf210591c095fef95477
-
SHA1
7c579ec9a1b6cef5319c2655601622066fe835e6
-
SHA256
e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b
-
SHA512
ad9a647e584f52044bf32d071b0f0a9989fdb4d5a214ce90a789adf1878deb32751e55c530b41b0b18e4969489b69ee06e257c042cf42054b60c1d91c590df96
-
SSDEEP
1536:Pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/52113:ndseIOMEZEyFjEOFqTiQm5l/52113
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1660 omsecor.exe 2032 omsecor.exe 1492 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 3052 e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe 3052 e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe 1660 omsecor.exe 1660 omsecor.exe 2032 omsecor.exe 2032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1660 3052 e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe 30 PID 3052 wrote to memory of 1660 3052 e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe 30 PID 3052 wrote to memory of 1660 3052 e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe 30 PID 3052 wrote to memory of 1660 3052 e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe 30 PID 1660 wrote to memory of 2032 1660 omsecor.exe 33 PID 1660 wrote to memory of 2032 1660 omsecor.exe 33 PID 1660 wrote to memory of 2032 1660 omsecor.exe 33 PID 1660 wrote to memory of 2032 1660 omsecor.exe 33 PID 2032 wrote to memory of 1492 2032 omsecor.exe 34 PID 2032 wrote to memory of 1492 2032 omsecor.exe 34 PID 2032 wrote to memory of 1492 2032 omsecor.exe 34 PID 2032 wrote to memory of 1492 2032 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe"C:\Users\Admin\AppData\Local\Temp\e0c43625ac24f5146667cb9245f25aa2257c234ede6abd81e47d268bc1f2dd5b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD55d37743638ed91bc3ff4c1acdb30d462
SHA145d0faf34ad5fc56b995afb5a5cbecd8b73ac687
SHA2560ba26afc8f34466ecef2a4c096ea122bf0e95ad721bdf2f02632291a1296cf3b
SHA512fbb7d92b9c022e8fa648349e093b0fa68bbcf1638da3af39ce3c217349ce0e6569496c3acedad5985acfd92e640ac1dc1d1d94551b5d9040beef07e195d0f30a
-
Filesize
72KB
MD53a8f4654289d6008c7e06c80b67e6d79
SHA1f0c8b90ddfd355c96e0ccc7b1d048eba445e4127
SHA2562a18cd679409a88c6531a7c93f8d6cec5364b9a5136f1eaf6b5bc4618f70888a
SHA512534aac4b10eab5f9b0c3e3cf410946ef29d54ba9c41dfcfbe71f2a70152cbf13bc933cb4bd114f5c9eff912bd34144458da20b04d95ef706aef28599bdcad604
-
Filesize
72KB
MD5d38985af5986f618d5ad32c7ba46c573
SHA109475f213f107a436377dd889885eaa49da06db0
SHA25644e2148410498470f5dffbacd8ece347414243300c409301a6e6a28abd33ebd8
SHA5120f753774b75f29c1f0b612dc60936cfe364daf075c5ed819b06425f737d13566be78bf95687d65713f87528ec104d2c36e003689ff6f3d9e11223507d027467c