Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 21:21
Behavioral task
behavioral1
Sample
1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe
Resource
win7-20240903-en
General
-
Target
1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe
-
Size
71KB
-
MD5
59a8c47d53f2ac3614624307d509b36c
-
SHA1
a832daf4677363d58130efedade6ae57ea54f042
-
SHA256
1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266
-
SHA512
80d9d7a03444bd38187a26b84280306b5e33d71792d8aa4b3e1a3c9a9e36dc5879fed294eb09359d18fe073c3f947eaeb9bb9ddeffc128ce7854f1c3ea572c46
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHX:7dseIOMEZEyFjEOFqTiQmQDHIbHX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2716 omsecor.exe 3044 omsecor.exe 3024 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2396 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 2396 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 2716 omsecor.exe 2716 omsecor.exe 3044 omsecor.exe 3044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2716 2396 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 31 PID 2396 wrote to memory of 2716 2396 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 31 PID 2396 wrote to memory of 2716 2396 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 31 PID 2396 wrote to memory of 2716 2396 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 31 PID 2716 wrote to memory of 3044 2716 omsecor.exe 33 PID 2716 wrote to memory of 3044 2716 omsecor.exe 33 PID 2716 wrote to memory of 3044 2716 omsecor.exe 33 PID 2716 wrote to memory of 3044 2716 omsecor.exe 33 PID 3044 wrote to memory of 3024 3044 omsecor.exe 34 PID 3044 wrote to memory of 3024 3044 omsecor.exe 34 PID 3044 wrote to memory of 3024 3044 omsecor.exe 34 PID 3044 wrote to memory of 3024 3044 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe"C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5a3275f16a6a42e080f686c1877e8b568
SHA18b30b39b0274d42d178efc5ac5276ba632e0822e
SHA25618a148eb2bbe44f0244a9f7bc244c258aa996e5d2afeac0c098c8fe58b45d52f
SHA512104ad482cca5ea483ec90f2e0f8982fe9f41f76c89e7c692144efab1e5753865cf93aeace0f358ff0a1f7f420a10e594cf7e09228e0143570004c6b2d5948648
-
Filesize
71KB
MD5861aa70ab872abdd3243d263431b3165
SHA1cbee1486ed80885cb8731bbee7fdeb07b800feb4
SHA256b3f280f5d70bfd37caca1efe27614254a859784686136b97846ce33f0d9c25ab
SHA512db34435d58138407e850873b5dd64fbf76a2ac94e3f142c2c7bf4aeee838591771c49b8d7a70b6e4c8cd7b46dcd351022707265d868dbca15968a237a2cec034
-
Filesize
71KB
MD5600afbbf8dd4e62cd74f003cc280ff1b
SHA1a83905203eb4608cdc56d57d4b241c1d9742cc15
SHA2566352ae491f8dfb84b380efa19302870adc024ae9a17908c8fc3bc84ac6966f49
SHA5128de15683076e7501d506481bf4cd4e8e61afe8280e09a01e3e24526a1130616f9e0d5b701da64f2e444e99c363ddad65dadd73151222a27e5e504622b116890d