Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 13:29
Behavioral task
behavioral1
Sample
0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe
Resource
win7-20240903-en
General
-
Target
0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe
-
Size
80KB
-
MD5
be9b73a0ecea7c7c16e179b5f7abba60
-
SHA1
3e76d0ec8ff03bfcba85733b1a8c32834bf5a7c0
-
SHA256
0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639
-
SHA512
938d9f6542d590e391972a4488589c05e0b5f8916225015d2f857610fdfc94854960b4e5dcd19208781226190d83ae19e7dded4ad5055c47b1c1ec5b22457dde
-
SSDEEP
768:sfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:sfbIvYvZEyFKF6N4yS+AQmZTl/5S
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2388 omsecor.exe 1112 omsecor.exe 1788 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2072 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe 2072 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe 2388 omsecor.exe 2388 omsecor.exe 1112 omsecor.exe 1112 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2388 2072 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe 30 PID 2072 wrote to memory of 2388 2072 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe 30 PID 2072 wrote to memory of 2388 2072 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe 30 PID 2072 wrote to memory of 2388 2072 0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe 30 PID 2388 wrote to memory of 1112 2388 omsecor.exe 33 PID 2388 wrote to memory of 1112 2388 omsecor.exe 33 PID 2388 wrote to memory of 1112 2388 omsecor.exe 33 PID 2388 wrote to memory of 1112 2388 omsecor.exe 33 PID 1112 wrote to memory of 1788 1112 omsecor.exe 34 PID 1112 wrote to memory of 1788 1112 omsecor.exe 34 PID 1112 wrote to memory of 1788 1112 omsecor.exe 34 PID 1112 wrote to memory of 1788 1112 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe"C:\Users\Admin\AppData\Local\Temp\0a62e2fbb1d9c3fcdb07af63912c3915fd2742b011b9a4d23e53fff561342639N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1788
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5a42fbb98c18c39ab516f813026f960ca
SHA12769f9199bfef1cff6c525f791465834dd76c61e
SHA25643e7ee51f28556406ef7c61c29390fd323e366cefd5fb391d492f8e2eac09bb0
SHA512acf1b87467487aa04faf5eac304eaa96b78b405fc8bb0cf0b9502a86819c9b6dc7a16ae29efdf75001f3acd9a60fb8d8886e631d945312eba6865ceb584495d5
-
Filesize
80KB
MD5a58284942121fb4fd3e535c4d24af7e9
SHA11eecaf4e76133ad3ee3917343dc89d07adcc9df6
SHA256425e9f2e72d1b2aee6cd77fdcc35cada58b9e75e584fbd2ce416af2ad0f9e6d2
SHA5123a49111c0373e4091601530f5af78e0a30d9f72d3075e497818a89a5d40a84089ca552fd6592bb1143d847fa2c049f3e6fd4d5ff4cbf368e89fedcb604242a8a
-
Filesize
80KB
MD5c699f2acf12de3c6ca67a899687ba9f7
SHA121db630ea25ad202f0baa052a0fc101da4aa573c
SHA2562432470d4011874d1ae59e8e62d47d2f5dd2cfcb785dff12b3394e82a67d6264
SHA51259ebf47daea6ec041f33ce0fe0a99b110a134e5c30ac0d8047055720597808b8c904ec575956cf55871219e62fd750bdd10ccec4b247d8a7210907b9fd310bc1