Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 13:20
Static task
static1
Behavioral task
behavioral1
Sample
fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe
Resource
win7-20241010-en
General
-
Target
fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe
-
Size
33KB
-
MD5
d3f0cf406da9136839b1e44fe2f893d4
-
SHA1
50e893170eb84751f4dd73c0999a070ca9b76119
-
SHA256
fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b
-
SHA512
66aa4b677c1c928f48ddb67238b73ceb65231c023c515b8ce8c7b0d4cd8b0e71b66bdb12e074f9ed0f3a4cbf2762c91e71fca7b5c32d82555d11cb8907faae8a
-
SSDEEP
768:LfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7Dj:LfVRztyHo8QNHTk0qE5fslvN/956qg
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2364 omsecor.exe 2276 omsecor.exe 1836 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1740 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 1740 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 2364 omsecor.exe 2364 omsecor.exe 2276 omsecor.exe 2276 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2364 1740 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 30 PID 1740 wrote to memory of 2364 1740 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 30 PID 1740 wrote to memory of 2364 1740 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 30 PID 1740 wrote to memory of 2364 1740 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 30 PID 2364 wrote to memory of 2276 2364 omsecor.exe 33 PID 2364 wrote to memory of 2276 2364 omsecor.exe 33 PID 2364 wrote to memory of 2276 2364 omsecor.exe 33 PID 2364 wrote to memory of 2276 2364 omsecor.exe 33 PID 2276 wrote to memory of 1836 2276 omsecor.exe 34 PID 2276 wrote to memory of 1836 2276 omsecor.exe 34 PID 2276 wrote to memory of 1836 2276 omsecor.exe 34 PID 2276 wrote to memory of 1836 2276 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe"C:\Users\Admin\AppData\Local\Temp\fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5bda0144dd27c24e62b4b297335b54457
SHA1271a84cb22521148c4885f3363cfe83d74e9cd53
SHA256c46ae14328aa619df6c3e20b4cc284af6187e314ffca154eb51d78316cc862c9
SHA5125e704e914656a5d5ec7f3dfeaa7d5a8a1e5603372aa83574ae759585a8315d67228a8cb054bb45c22bde76b6edd6fdb134eb2eb4245dfc5432b989b450cf40fa
-
Filesize
33KB
MD5f23d98f6c76adc0dfb361e85325ae672
SHA12f0d489756448cd85b17c47a1beb0e4712e1b71a
SHA256db6a51d2a4e85cea1f06673e0483c826ec378846a46d28cf6b2caa70edcd4529
SHA5126affa7115d6bdaaa98c17aee4b03b9f7bbec626e29ff2922f8565c9671322f5b72cd98de4c1a357ec888e53de4bc95a93a5608a0a9d66214ebc68c99dc61635b
-
Filesize
33KB
MD57af60394ad210d3e703bc973b34327ed
SHA1e67a9cbaad7e83a3ad0ae780aed2e73914da1930
SHA256fea4ea484d447f03c5a70ea3b20c90c1eddc95fea4739d1e8cb323a3190ddc5f
SHA512abfef0423e09287110b79242b43bec5aefd5caef76bada7778f538330372dc666d7e9a9a1eb338448dabd41e3e9ebe3dcc0c1874fa964aa46504c5af9688bbe1