Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 03:16
Behavioral task
behavioral1
Sample
558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe
Resource
win7-20241010-en
General
-
Target
558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe
-
Size
71KB
-
MD5
7ce19ee46b20bc7fa97de6575b57fcd0
-
SHA1
b81fcd0ba1fc81b2217a225b941af81ec84511a2
-
SHA256
558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bb
-
SHA512
1fa6cb702e727ead10bab315b3e91826615c713588a74b06c55ec730410a2c3d61b42688e4e6caf9e5d261f1155616a30061c3ac262c35a0f5174129240b6f2d
-
SSDEEP
1536:Hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:vdseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2684 omsecor.exe 2652 omsecor.exe 1776 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2876 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 2876 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 2684 omsecor.exe 2684 omsecor.exe 2652 omsecor.exe 2652 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2684 2876 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 30 PID 2876 wrote to memory of 2684 2876 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 30 PID 2876 wrote to memory of 2684 2876 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 30 PID 2876 wrote to memory of 2684 2876 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 30 PID 2684 wrote to memory of 2652 2684 omsecor.exe 32 PID 2684 wrote to memory of 2652 2684 omsecor.exe 32 PID 2684 wrote to memory of 2652 2684 omsecor.exe 32 PID 2684 wrote to memory of 2652 2684 omsecor.exe 32 PID 2652 wrote to memory of 1776 2652 omsecor.exe 33 PID 2652 wrote to memory of 1776 2652 omsecor.exe 33 PID 2652 wrote to memory of 1776 2652 omsecor.exe 33 PID 2652 wrote to memory of 1776 2652 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe"C:\Users\Admin\AppData\Local\Temp\558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD566dd47c76706a2d0087a4dbd8c9913b6
SHA1f97ca32def32a7953e131bdec65f81d1b5ceb28a
SHA256314bd15302088f88eaf3e456b6ad82410881a48d6761b12a1e401b6bb3f385d2
SHA512ae96a63643b248b556092a6c977dfe97c2e1d45e3cde2312050b1a4b18de659d225de231e2871670e522df11d3c1871cd6c3c1b1652c7a7f18df7a0e441661c4
-
Filesize
71KB
MD555af92e1c5f4c5d4503c63132351915d
SHA1bd045d93d6164a8d6d4ede31043734175c985c40
SHA2561bea8350bf221dfa97dd4f7574d403eef891d0cd0e0422c48763fb09807b40ef
SHA5121116409b5694f5312297a50b6671539bfe0c59eafe4a4654ee021273a5a501e555805636219d281829d39dae458acd588f021c1683815a8f9eca64f088933575
-
Filesize
71KB
MD55704d5023b709271195415f311e57f4a
SHA16e8ad4134d9abf325f41f8501a0e9429faf8f461
SHA2569dee10deb7fdf8fc7521fecad720534e4b52b5809b431680c6d078f85255b625
SHA51254489bc0e689e4b29392ca98cc71d189bd3e81c398d81e2e51e80adf66062f3fdaeea3c125be4dc31893eff778b52a226c5b2491924eb395bc5944ba404586a8