Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-01-2025 20:13
Behavioral task
behavioral1
Sample
cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe
Resource
win7-20240903-en
General
-
Target
cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe
-
Size
65KB
-
MD5
eae6ab953b46554b3130226434d53775
-
SHA1
22d6eb2bdcd26d7e8004e7c93a2b4c0885781ea8
-
SHA256
cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e
-
SHA512
75326d09d675b64df335a9156745057f23f60de09b4e238976df4a51a1dd3c0805254b86df87334b4594be6c9345fc89350baa28c5be8a68fd386ba702d40ce5
-
SSDEEP
1536:Td9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzd:TdseIO+EZEyFjEOFqTiQmRHzd
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2232 omsecor.exe 2624 omsecor.exe 1984 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2552 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 2552 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 2232 omsecor.exe 2232 omsecor.exe 2624 omsecor.exe 2624 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2232 2552 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 30 PID 2552 wrote to memory of 2232 2552 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 30 PID 2552 wrote to memory of 2232 2552 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 30 PID 2552 wrote to memory of 2232 2552 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 30 PID 2232 wrote to memory of 2624 2232 omsecor.exe 33 PID 2232 wrote to memory of 2624 2232 omsecor.exe 33 PID 2232 wrote to memory of 2624 2232 omsecor.exe 33 PID 2232 wrote to memory of 2624 2232 omsecor.exe 33 PID 2624 wrote to memory of 1984 2624 omsecor.exe 34 PID 2624 wrote to memory of 1984 2624 omsecor.exe 34 PID 2624 wrote to memory of 1984 2624 omsecor.exe 34 PID 2624 wrote to memory of 1984 2624 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe"C:\Users\Admin\AppData\Local\Temp\cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ea52f267b840aa76b72ac3815b308014
SHA1381f5d2e2b54a58ef7474dc52fea9b21fc469792
SHA2561de9490ff325982259fc5e9dc53329904c8e57687baec95de1461cfa207fdfd5
SHA51209002dd91b3bfae2ee4a68cc15389a615e55d36b30c8bab9c3cdbe4be03dfa95e201a17d03e3a4f0eaa4d62b9e620e9341282075095a71e3c3c32be776a420b3
-
Filesize
65KB
MD5edb6673f4e53d952efa7e2ba909462ce
SHA1e6c00f469fc9b3fe5c7fd7de7aba42b86b37714d
SHA2564426d01202bf8770b80f0f0ebda27b362a676ba6c1f94389218f6aa088363bf0
SHA5123b3837d43605b2979cd7596ed9202a17795311e4afe99988fb504b0aae15ac5ced7cb931f14ac9892b6dedff9febd53752cffc2bbb95332d18a7415278731bc8
-
Filesize
65KB
MD5baa78cd98778a30970f952d8cfec945e
SHA143826478da80b73b3b93a2e1c1ee78ba2727d629
SHA25693a495c4ac1e2232a353df2d44217174aecdd003ac49a3cb0467bfc5e400d011
SHA5129ea4e3f1cc6fdbc40894fdb96e93435ab301d9d5ff4277877a0eb310a4ff1215ed74b61f5ae5aa9dfee5b8311accb5421de94b456919bc54502dcd0b2b1ef4ce