Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 16:55
Behavioral task
behavioral1
Sample
a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe
Resource
win7-20240903-en
General
-
Target
a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe
-
Size
88KB
-
MD5
3f55b3190b0c45b83dc48b7112da87cc
-
SHA1
17708d2217db6973e7e54c2bc2d578b47090b8f6
-
SHA256
a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18
-
SHA512
e7823ed80f3654102b6e6ab904fa9636696083ad76fb4e28cfdb667113a3d94aa36de9b685704323a1f66b8f00b8d361fc1beca411545f90c971a34c76c202ef
-
SSDEEP
1536:nd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5T:PdseIOMEZEyFjEOFqTiQm5l/5T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2720 omsecor.exe 1360 omsecor.exe 1748 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2640 a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe 2640 a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe 2720 omsecor.exe 2720 omsecor.exe 1360 omsecor.exe 1360 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2720 2640 a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe 30 PID 2640 wrote to memory of 2720 2640 a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe 30 PID 2640 wrote to memory of 2720 2640 a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe 30 PID 2640 wrote to memory of 2720 2640 a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe 30 PID 2720 wrote to memory of 1360 2720 omsecor.exe 32 PID 2720 wrote to memory of 1360 2720 omsecor.exe 32 PID 2720 wrote to memory of 1360 2720 omsecor.exe 32 PID 2720 wrote to memory of 1360 2720 omsecor.exe 32 PID 1360 wrote to memory of 1748 1360 omsecor.exe 33 PID 1360 wrote to memory of 1748 1360 omsecor.exe 33 PID 1360 wrote to memory of 1748 1360 omsecor.exe 33 PID 1360 wrote to memory of 1748 1360 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe"C:\Users\Admin\AppData\Local\Temp\a869b932a309809104b953c6d85343c402d6c6febe2e063514a1f0feb8ea5f18.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD583d24cc332ae8d645911417781fb9dba
SHA150f5426a96093e4e1528fb69f1960276cd0ae141
SHA256b5c2e5a468ce8621dae1ac0c499e7e61e00c7cccd9bc1118b666ca85e920fbe9
SHA51256f960a86ab4f40e49b1adbca7848de6258cc8218a2e8bea5f545b5f88a73448cb32befc58bedcdf4e56e77d836b0a6de9b39be2c34ebb3d38ee8bdb73cd48d4
-
Filesize
88KB
MD513e5c3ebad2622eee988942d10cdf3fe
SHA1ba35c3ad4eb5c11d1d583ea5bcdf968557e121f7
SHA25648aa8c40c858e4a464d909f796582a56f1a857344be32286ef07a2540cb705bb
SHA5120375b1781b9ea645d4aab94d9b302f5574b60f3a203750d1b725b34c9ccec50ac06f9d87bfaa51b4945e1b8d2bb30ea868d7d96ae3ba6a38300918176476c879
-
Filesize
88KB
MD56fa5af25c1c5e9588acdd37299aa2bd9
SHA1896d8dc5bdaccdf337c6604eb3bf6f745d369523
SHA2564c2060cf456d95ade3c322b1675c2601a768ea316864825a5acd09ae6d29a695
SHA512826b4da602f8ef04fb25dd80ee2691819900fb68f5e19c388b2caf18d099549aae4f7922d7f710290962dfaeaa648c59a5ef12b2cc4de8fd848559750ec65731