Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 10:38
Behavioral task
behavioral1
Sample
4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe
Resource
win7-20240903-en
General
-
Target
4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe
-
Size
65KB
-
MD5
9eabfbe419aedf8740f9064e5f304e7f
-
SHA1
63b6d3cb7cefaaa720ac64c38b916195dab9068f
-
SHA256
4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4
-
SHA512
f9351a87df69da31a60f9bbf4f4be79769d8d311355bde4e48b0644a9c1ccd311aa1ef93b4cc49c9453aeaa26a8c8df973bfcdeacfe94786ac7fc61d48edcd7f
-
SSDEEP
1536:4d9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/HzF:IdseIO+EZEyFjEOFqTiQmRHzF
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2632 omsecor.exe 2256 omsecor.exe 2720 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2316 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe 2316 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe 2632 omsecor.exe 2632 omsecor.exe 2256 omsecor.exe 2256 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2632 2316 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe 30 PID 2316 wrote to memory of 2632 2316 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe 30 PID 2316 wrote to memory of 2632 2316 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe 30 PID 2316 wrote to memory of 2632 2316 4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe 30 PID 2632 wrote to memory of 2256 2632 omsecor.exe 32 PID 2632 wrote to memory of 2256 2632 omsecor.exe 32 PID 2632 wrote to memory of 2256 2632 omsecor.exe 32 PID 2632 wrote to memory of 2256 2632 omsecor.exe 32 PID 2256 wrote to memory of 2720 2256 omsecor.exe 33 PID 2256 wrote to memory of 2720 2256 omsecor.exe 33 PID 2256 wrote to memory of 2720 2256 omsecor.exe 33 PID 2256 wrote to memory of 2720 2256 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe"C:\Users\Admin\AppData\Local\Temp\4d3e6ea9c8d7e205cda7f69d64fd1acb0a6ee1b47bfa549ea7439980a63179d4.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5cee1a4ab1fe0e299d506cc51ba85eb42
SHA10e4e690791058adf43b408ee795c2b3e78e8d54b
SHA25675d899f71e1a999df065356179746d49707e3105cd31484d2016d18031763d74
SHA512e069cd759483a27a1c13c6e909059fa126bb3b5f5d58a7ace3ead708f6f951d6975573d257c6e461fc06e15af412526dc5a67105a6be4474f6dce2c1116773c9
-
Filesize
65KB
MD57f954a71621cf75a4adcb4e1444b4aa9
SHA13662d1b1a70617e4d5f88de7dca413db38081bc6
SHA256c168aa63446998bae031082fd62c93732b1da68ada57d37205b59885b601c6cb
SHA512cc7771d36fd24535b96b1f2a0b55bf296af9a8e4e366112695bc13c33973920b02dcbcaed1d9e571a3335a7a5beb7f34fc0b98fe941f36595b6d523ee1dcf173
-
Filesize
65KB
MD5d7bb56c82e2ccebed64086e7ce8da4c7
SHA16de03689b9bec2b3df2c94ec17bee24ad177d2b0
SHA2564f84b9007f7393785632cdd4f13cb1f0ae21dd2f17f805f118a243cb7094bd83
SHA5129a83228b246d88a8c6491bcd4f302a7307bdd4c054366e8472f49d88e873e9dca30b92f2bffbb2a72b8d07fb5e55d800bae8fad32c9d3102d0ce1955bd640c3b