Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 13:07
Behavioral task
behavioral1
Sample
df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe
Resource
win7-20240903-en
General
-
Target
df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe
-
Size
72KB
-
MD5
ab4f61fef0ff7358cbfffaf022324ce5
-
SHA1
300c6c788cc3bc1a9eaf268679a37033dba7771a
-
SHA256
df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df
-
SHA512
79ac1e5bbfc8eb7ea87984934af4beca0cd1c03794802aecd621c83633780b6ed118c8c434667c736cf5d82b8615cace4de636ee7b72dfff6fe5d7fbee8d59c0
-
SSDEEP
1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211N:bdseIOMEZEyFjEOFqTiQm5l/5211N
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3020 omsecor.exe 680 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 3004 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 3004 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 3020 omsecor.exe 3020 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3020 3004 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 30 PID 3004 wrote to memory of 3020 3004 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 30 PID 3004 wrote to memory of 3020 3004 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 30 PID 3004 wrote to memory of 3020 3004 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 30 PID 3020 wrote to memory of 680 3020 omsecor.exe 33 PID 3020 wrote to memory of 680 3020 omsecor.exe 33 PID 3020 wrote to memory of 680 3020 omsecor.exe 33 PID 3020 wrote to memory of 680 3020 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe"C:\Users\Admin\AppData\Local\Temp\df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD551719922ea0a2797859e18285458f816
SHA123ad62e8d96b47b133e2982f2814b9ee44afca36
SHA256ed98b469a145894e00d39ec14bc7a182c14cb31aa38fec217690c300c79acbe7
SHA5129d88e5faaa8bbf9898b262d5eaf48f39cabffc73d258390a4688862662e237d4d4887a68fb0035b846c9592fe3989a60de9dc4e305b640ceebb772b44a16c887
-
Filesize
72KB
MD50dc4f7461919ef9929cafe4e1e34cd4f
SHA1907cb7c9edecdb575f8ce90ad272afe2b056916f
SHA256a31bab4ed3fce599e58947a62b468fd4915b539a2a08c05db8241dbf26ac1e4b
SHA5123d2f1d4b8e1790419f555998dd52bbeb9787db3e33fde509fbc9f176628d5793cd42a7a4d6bf55166489ae540f8f76c789c33fee3970f8e25d5a8ff5bb8a984d