Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 15:20
Behavioral task
behavioral1
Sample
ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe
Resource
win7-20240903-en
General
-
Target
ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe
-
Size
80KB
-
MD5
da076b2ed075a780af25e7c8c523a56c
-
SHA1
9f109ea722d2a1c9ba0593bf40a1557ef1fa33d4
-
SHA256
ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a
-
SHA512
134821e7cd856403a6ee3b4224093baec2d6c8f0de9cc1189a51d6b9c2efa578e2d1485cd1b54ef2ed89c04aaf192d07c33a93411520c79445caff5aced263fd
-
SSDEEP
768:/fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:/fbIvYvZEyFKF6N4yS+AQmZTl/5S
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1872 omsecor.exe 2684 omsecor.exe 2420 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2484 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 2484 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 1872 omsecor.exe 1872 omsecor.exe 2684 omsecor.exe 2684 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 1872 2484 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 30 PID 2484 wrote to memory of 1872 2484 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 30 PID 2484 wrote to memory of 1872 2484 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 30 PID 2484 wrote to memory of 1872 2484 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 30 PID 1872 wrote to memory of 2684 1872 omsecor.exe 33 PID 1872 wrote to memory of 2684 1872 omsecor.exe 33 PID 1872 wrote to memory of 2684 1872 omsecor.exe 33 PID 1872 wrote to memory of 2684 1872 omsecor.exe 33 PID 2684 wrote to memory of 2420 2684 omsecor.exe 34 PID 2684 wrote to memory of 2420 2684 omsecor.exe 34 PID 2684 wrote to memory of 2420 2684 omsecor.exe 34 PID 2684 wrote to memory of 2420 2684 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe"C:\Users\Admin\AppData\Local\Temp\ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD54930377a5451987222094d54c8bf4048
SHA1364a3f18bdd62c1fb6ba18787c6255755fa2c8e4
SHA256ea728b35c2db687b50470ab9b908f6f98c1b356752f9174e4a20aa6dd92b6ce4
SHA5123ac22ac826fb09d85af3e4bd7b661f57eee5d22a85d77da2784ca05049c382a580b34d0f71cdae8e851b2fe2ad3b24a9944c4659037ee74d3ce07fc68dcf4496
-
Filesize
80KB
MD5042befd6fa5b825709f0ea97bc2ab0d0
SHA173a60e27ea53b85ff29fc003d60804347584fc0b
SHA25611c1f13a10b28cceeb6cd16ff4dae844f1cf05cc3905af4d2be72938602bccba
SHA512dd02b3ee33a9645602b36df70fbf20d9d1cebf6ade1c4be602e3bafa37dd92e0e1c4abc395cbc777b86b825957cbb92d047d5357c0bfd0b7ecd947283b84dd07
-
Filesize
80KB
MD5a60951453f60aedcd8b924635a4289bf
SHA1f24dc44779243c70e8a125508358d0f61dfd4fe5
SHA2568b54a22d926f12ef9088ec41875eef89503713661379b0b9743d2d1604f4ec14
SHA5120308746e318f674b8b74b347544e602f72c4b39628f18e6bf90e93eaf1a455704573b799f594ed948c8f26b14610f70622448751f7a5bdf9fcba01a044a71c9c