Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 03:13
Behavioral task
behavioral1
Sample
5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe
Resource
win7-20240903-en
General
-
Target
5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe
-
Size
80KB
-
MD5
431e044ebf05b222a2a8135ddc28cb70
-
SHA1
9aadb3aeae060ffc8f6bd055a4a06413a135eb4c
-
SHA256
5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490
-
SHA512
39958eaef07cad655fa0858af0abe45c1a6551aeae8ffda7e3879b40f9c324b1ec329227a6e810f069e83f98174f06f6ce89960ddb69c888fd70ec8605429ba4
-
SSDEEP
1536:Od9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:WdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2724 omsecor.exe 2840 omsecor.exe 2948 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2708 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe 2708 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe 2724 omsecor.exe 2724 omsecor.exe 2840 omsecor.exe 2840 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2724 2708 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe 31 PID 2708 wrote to memory of 2724 2708 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe 31 PID 2708 wrote to memory of 2724 2708 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe 31 PID 2708 wrote to memory of 2724 2708 5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe 31 PID 2724 wrote to memory of 2840 2724 omsecor.exe 33 PID 2724 wrote to memory of 2840 2724 omsecor.exe 33 PID 2724 wrote to memory of 2840 2724 omsecor.exe 33 PID 2724 wrote to memory of 2840 2724 omsecor.exe 33 PID 2840 wrote to memory of 2948 2840 omsecor.exe 34 PID 2840 wrote to memory of 2948 2840 omsecor.exe 34 PID 2840 wrote to memory of 2948 2840 omsecor.exe 34 PID 2840 wrote to memory of 2948 2840 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe"C:\Users\Admin\AppData\Local\Temp\5c3f04b162538d05c368c5c4f3123e4a914c64200b5fdb91e524ce5f977ae490N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5281dcbafce34479ee7ddf9fd3d859629
SHA197a424dc726f8ecd68f8346430224cb37e9b5bdc
SHA256b5767afd76c3e237d24f498900a501a353c706cfc94637f57b1a09d3c3ade960
SHA51284af1cd321fa02b2c206a571f9e774c6474cbfd36e697d0c89b51c9dac5a69356c55770ff8307577edd42faff62a3cc2f9ffefd0892b404d33f07cd648d35bfb
-
Filesize
80KB
MD54865ee7de1deab80ee74a23d065cb541
SHA183a17afa28723454fa5abfba17d8db9e7dee1892
SHA2569ea17b04acbf67d7bcb5d9b58d21093e0d4a30a838fc17f14085a44c3944f0a2
SHA5128658141d1d117575cf5a666804aee8496586b01d69183f78909d22317dc59d6b832e425cab47feef22d34f1acaba6adcbd55b229afc7a2f144c25b18323e4b90
-
Filesize
80KB
MD58a984fc91f9735f2cd21879084dde71d
SHA14f856db9eb4e4fcd06cbbeca75a9ee65566a8860
SHA256548c50f6809d4a290e7d987c5846cc05d2275dc4f10ff94331a5b3930b517a2a
SHA5124782b486ebb71e461d623c96dce86f37d00f39de309382ee50562aa060ead68984bae2fca0fa4a3c572d655dbf250e1d4515ea3916ee30895b8755112e95d74f