Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:08
Behavioral task
behavioral1
Sample
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe
Resource
win7-20240903-en
General
-
Target
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe
-
Size
61KB
-
MD5
5cece95a926ddd025e3a97cf5a13f044
-
SHA1
0dec504f3b3526292722672d8105e1a90e7cb246
-
SHA256
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1
-
SHA512
fbe55158701e977c27f2c65c839554399b8413ffaa61b12df70cfae4aa6643025db412ca7b5bcae2e28c7b4e091bcfbdfdebc80459070b44ed8692fec947055f
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ1l/5:RdseIOMEZEyFjEOFqTiQmXl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2720 omsecor.exe 1852 omsecor.exe -
Loads dropped DLL 4 IoCs
pid Process 2768 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 2768 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 2720 omsecor.exe 2720 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2720 2768 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 30 PID 2768 wrote to memory of 2720 2768 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 30 PID 2768 wrote to memory of 2720 2768 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 30 PID 2768 wrote to memory of 2720 2768 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 30 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33 PID 2720 wrote to memory of 1852 2720 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe"C:\Users\Admin\AppData\Local\Temp\adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD576a3cb5b776b0ca47bdf4209507bb557
SHA1c342a00daa71aa1e22782bea375747092b221f47
SHA2567e605a2b4b368d47b085546d08385f561a6cb12f722ff325f20455972c6b7a9a
SHA512d01e48a137b01ffe087ba63a7acfdd0dd14ca114ddbe60189d4bf9623cb48847474247ae426145ce2002397f598f5c35650d8ba6087b8a0cdb3c2e46222eecb2
-
Filesize
61KB
MD5d9c40e687314d963c845d28fba63214d
SHA1a77e2b38be800eca66dc745e583f639570208564
SHA25646f212872311e6a4573586ac35dd9589a317460684cfb35ef6ce88bc1eef6cf7
SHA51259c66d00403246481336baf56e2a8e4dd96fd29772a173fe3193e4a539fe1a1ceb815cf242d20d23f8967a8d84548da4103e75b8e54d079132601efd25a0c7c1