Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 04:47
Behavioral task
behavioral1
Sample
52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe
Resource
win7-20240708-en
General
-
Target
52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe
-
Size
71KB
-
MD5
21cc6c38f55dc1d69047ff39215232c0
-
SHA1
94c2c34f29f4446f31cfcb34a173e099d12491a5
-
SHA256
52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7
-
SHA512
5bb568df180a048c0b3030544db0bf98fc5724aa67552eba353d0adac9c1d4b35b131028dcb25497a06e1e0cc6e19cde5e6fdfaead0929a9d14964a2d1aa4b14
-
SSDEEP
1536:Hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHH:vdseIOMEZEyFjEOFqTiQmQDHIbHH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2352 omsecor.exe 1032 omsecor.exe 1764 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2348 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe 2348 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe 2352 omsecor.exe 2352 omsecor.exe 1032 omsecor.exe 1032 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2352 2348 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe 31 PID 2348 wrote to memory of 2352 2348 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe 31 PID 2348 wrote to memory of 2352 2348 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe 31 PID 2348 wrote to memory of 2352 2348 52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe 31 PID 2352 wrote to memory of 1032 2352 omsecor.exe 33 PID 2352 wrote to memory of 1032 2352 omsecor.exe 33 PID 2352 wrote to memory of 1032 2352 omsecor.exe 33 PID 2352 wrote to memory of 1032 2352 omsecor.exe 33 PID 1032 wrote to memory of 1764 1032 omsecor.exe 34 PID 1032 wrote to memory of 1764 1032 omsecor.exe 34 PID 1032 wrote to memory of 1764 1032 omsecor.exe 34 PID 1032 wrote to memory of 1764 1032 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe"C:\Users\Admin\AppData\Local\Temp\52a2f3427764b71e5c9bb4ad8d06f2faa459fae8e5a7163cc0b03aeba40161e7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1764
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD57d6b4ebf35a1d1cb220ad2416d8d7fde
SHA1e619156eabb9763cb053389d89b179702e279e7c
SHA256d3a460e4e4104aefe151dca3bd858008418217c3a7c27dbf7841706dbd24afd0
SHA512d266ed8046cde5d5902a4a987e6297f90c1a2b013601b2285028d7485bfff1b38c98cc5cfdde40a6c61c7af234fd42e590e18aae51abef314acd98e8b8b4f998
-
Filesize
71KB
MD56ad2d5fb0f8e5776b33fbe13dffc1da7
SHA17d21220bdfff7faa2b99e2eb7c4acae4dbcc948c
SHA256febbcc6d3bddc4f6d0bcca12c6bddca25ac823957d11e78eddda00e7cb3909a6
SHA5127751a21cbfb8653f8fa6c00dcf6a6e627dee016ef23e56c44035e65af852df0abe2541cb7d907e321a96e71053f27c5c7c9f32e3f08e1c0836b677d6405f37ee
-
Filesize
71KB
MD51834ad09d06dcd0ab9e5171da1fa79d5
SHA1c1da4654a16c18260aac66c0a09b379b1afea658
SHA256d0913239817cd6bc6cd5245a68f7eb3c249630a901c0557b0e0af5ccb4e4fb15
SHA512a0232f79b98bffd9808386e461c77b0fb6ca6790ce3efb70088badeb8daf4cd3ace0eaceb94217cfc469609b1327467272acf864c42ec873703297139101b00a