Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:16
Behavioral task
behavioral1
Sample
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe
Resource
win7-20241010-en
General
-
Target
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe
-
Size
61KB
-
MD5
5cece95a926ddd025e3a97cf5a13f044
-
SHA1
0dec504f3b3526292722672d8105e1a90e7cb246
-
SHA256
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1
-
SHA512
fbe55158701e977c27f2c65c839554399b8413ffaa61b12df70cfae4aa6643025db412ca7b5bcae2e28c7b4e091bcfbdfdebc80459070b44ed8692fec947055f
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ1l/5:RdseIOMEZEyFjEOFqTiQmXl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2424 omsecor.exe 2312 omsecor.exe 2924 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2172 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 2172 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 2424 omsecor.exe 2424 omsecor.exe 2312 omsecor.exe 2312 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2424 2172 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 29 PID 2172 wrote to memory of 2424 2172 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 29 PID 2172 wrote to memory of 2424 2172 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 29 PID 2172 wrote to memory of 2424 2172 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 29 PID 2424 wrote to memory of 2312 2424 omsecor.exe 31 PID 2424 wrote to memory of 2312 2424 omsecor.exe 31 PID 2424 wrote to memory of 2312 2424 omsecor.exe 31 PID 2424 wrote to memory of 2312 2424 omsecor.exe 31 PID 2312 wrote to memory of 2924 2312 omsecor.exe 32 PID 2312 wrote to memory of 2924 2312 omsecor.exe 32 PID 2312 wrote to memory of 2924 2312 omsecor.exe 32 PID 2312 wrote to memory of 2924 2312 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe"C:\Users\Admin\AppData\Local\Temp\adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD576a3cb5b776b0ca47bdf4209507bb557
SHA1c342a00daa71aa1e22782bea375747092b221f47
SHA2567e605a2b4b368d47b085546d08385f561a6cb12f722ff325f20455972c6b7a9a
SHA512d01e48a137b01ffe087ba63a7acfdd0dd14ca114ddbe60189d4bf9623cb48847474247ae426145ce2002397f598f5c35650d8ba6087b8a0cdb3c2e46222eecb2
-
Filesize
61KB
MD584ad64dcfd906654ea4bb370d3457206
SHA1a18d279e15a0358cc5eb9bd427c5cfece3ee3e0e
SHA256b1057e1a61818589cb8511f1eb5141314f8937fe2de67d1972823de717c20815
SHA512cb1fa133c4af70ad2c37a702e94a7a0849218d806ee2c7600748b3ea7840a1457abfdd2aa4e547883c53501837f59469150794a3a4e957590f47824393e2d888
-
Filesize
61KB
MD57d76ec0c3296741e07c884558d7cfecf
SHA1bd91eb185d1312c8b3d52f37261f841641dba9a3
SHA2564abd3221b0ac22fea5ce89561b5e4259c1e6fcc385bf570864887ed21c468654
SHA51291ec19d2af252897c1936a6ce06607811d225cee331fdd96dd70074b8e00b5717f68aece0bb39b64eb0fed30ce78a259f6a2f4c0c3946126131689738402bb35