Analysis
-
max time kernel
116s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 09:18
Behavioral task
behavioral1
Sample
6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe
Resource
win7-20241010-en
General
-
Target
6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe
-
Size
65KB
-
MD5
967d66a4fe4c892c456e5b311c9f8030
-
SHA1
737f06df05b84c744cac6f17ad38ed01a8e543ce
-
SHA256
6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70
-
SHA512
57cbc624688ac0abbfa21e9c6ec5979d5e177929a9d22f7c20bea7be9771b9a119f4c608ada98646ab6bcdd9e2c506b76562503c80aaaa6c7b878ae9ab56397c
-
SSDEEP
1536:Td9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hz:TdseIO+EZEyFjEOFqTiQmRHz
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2744 omsecor.exe 1340 omsecor.exe 2612 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 796 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 796 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 2744 omsecor.exe 2744 omsecor.exe 1340 omsecor.exe 1340 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 796 wrote to memory of 2744 796 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 29 PID 796 wrote to memory of 2744 796 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 29 PID 796 wrote to memory of 2744 796 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 29 PID 796 wrote to memory of 2744 796 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 29 PID 2744 wrote to memory of 1340 2744 omsecor.exe 31 PID 2744 wrote to memory of 1340 2744 omsecor.exe 31 PID 2744 wrote to memory of 1340 2744 omsecor.exe 31 PID 2744 wrote to memory of 1340 2744 omsecor.exe 31 PID 1340 wrote to memory of 2612 1340 omsecor.exe 32 PID 1340 wrote to memory of 2612 1340 omsecor.exe 32 PID 1340 wrote to memory of 2612 1340 omsecor.exe 32 PID 1340 wrote to memory of 2612 1340 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe"C:\Users\Admin\AppData\Local\Temp\6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5c8ba6fc976a1a514a86b6fbb5b03b99d
SHA1a104400b57774c198272557bec9f16ccf66dcf08
SHA256116cf1c3a38fc0c1eea4316b4c80eb6822827ed17605bc741ed6392dce224771
SHA512f02457dbe9c7862448e6fd52be13c27e13236100d1fb8dc760f14b9b4eaa1dcaad18199791c803aa1a8f5ab9d674ac51a7d77b9028c35dbaef999804192c7267
-
Filesize
65KB
MD59bb5038ade500bdb002657e568b069d9
SHA1aa58bfa7cee2792f9e0b215a469103cde3f97372
SHA2561946f870c185909209bf1e54eed2793b87be7548ea219162a438efc5a1c45ea5
SHA51230994b7e15a949bc37a29294e383fb87de83c6f7ef1e0b6680915f34ff247196c901a0f940717007fee8998e89d968dd87405d38f637bcec48234bea451a4859
-
Filesize
65KB
MD5ab6abc98f7fdd779c4d5205809e15938
SHA1afcd558fbdaf5066958e6ab2b03e63f370923590
SHA25601c83788d8063cf5cbf55a0279c10d9c114439470e54a89fe1e137c81089ed4f
SHA512228afdc71e97729b73c8663246dad55cee6117f725f8aeabb8ac76d01c18728ce07ea709a27fe767db32c24544f5b219eff7524d0c20baa3de5077cde8e695ca