Analysis
-
max time kernel
106s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 02:26
Behavioral task
behavioral1
Sample
000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe
Resource
win7-20240903-en
General
-
Target
000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe
-
Size
80KB
-
MD5
0f2102dfd101497bf1c1427f0add67b4
-
SHA1
c75a668a75d7f06772c4e2698b8e4b4e2b270af5
-
SHA256
000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9
-
SHA512
aeb902bf9c67e5f76a5202a1b7d799fa67615e5031a5721f15a0fcabd9494f775282cf14ecd0be06d507654197bf5c00ef0680dc6f6a78830bb1e9ae98b5cd0a
-
SSDEEP
1536:ud9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzL:2dseIOMEZEyFjEOFqTiQmOl/5xPvwP
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2488 omsecor.exe 1868 omsecor.exe 2020 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1696 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe 1696 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe 2488 omsecor.exe 2488 omsecor.exe 1868 omsecor.exe 1868 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2488 1696 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe 30 PID 1696 wrote to memory of 2488 1696 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe 30 PID 1696 wrote to memory of 2488 1696 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe 30 PID 1696 wrote to memory of 2488 1696 000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe 30 PID 2488 wrote to memory of 1868 2488 omsecor.exe 33 PID 2488 wrote to memory of 1868 2488 omsecor.exe 33 PID 2488 wrote to memory of 1868 2488 omsecor.exe 33 PID 2488 wrote to memory of 1868 2488 omsecor.exe 33 PID 1868 wrote to memory of 2020 1868 omsecor.exe 34 PID 1868 wrote to memory of 2020 1868 omsecor.exe 34 PID 1868 wrote to memory of 2020 1868 omsecor.exe 34 PID 1868 wrote to memory of 2020 1868 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe"C:\Users\Admin\AppData\Local\Temp\000f38e22772063ed680321ab8a9e7038e26b19bc0384c2b82c25abf9133c4c9.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50c2b460086c8226f3037983718c0b38d
SHA15d74513531b32806516fe67615e71d971b26205c
SHA256d409a355651b94286b8cfc4754c99f57258d7603323f84224abdabffa7e409e0
SHA512f17d0be436feb083f3ef33dc3c34334ac6e9ba4dfc411c24ef986deb41486751bb7a1b9efbf4ea729b79640cdc59a87808fad1fdedf2ffc9ca266c2867bb5bd9
-
Filesize
80KB
MD50542e113d15b32ea9023d48ee381e0ca
SHA1d16953c8cf8964cb80bd5ef46b3b9d953aaf31ff
SHA2566db4f3aa81fd59d8c4e2b88024a0eb703088319fcaae10d9fd581e2c7fb02141
SHA512175279f373959782309e5a93c0140d9951c5fb6f23785306ec8853fea999988eac033ba59839cdae7381cf3661cdae28e30509a112fb18092aae6138cca204fe
-
Filesize
80KB
MD5356f38533cfdbb26690f6eabdc5b7b7f
SHA1bb0ed064938aa3abfaaec38fb8dfd71edec1f685
SHA25617be3534907be810d49f575787ee51910e36cff7db9814e0f5678f3a1879763c
SHA512eed65d9939c7e4f250a828be054fc86ffa1fb66b43d7707bec2cc7331b2c44688020d4717897ce686f3d560f59cf372fd86457d8d9eceff649757f6b1e8f0f4d