Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 18:09
Behavioral task
behavioral1
Sample
b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe
Resource
win7-20241010-en
General
-
Target
b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe
-
Size
80KB
-
MD5
9bc80822b028fff58ee08ec2ea934270
-
SHA1
f9bd989066a859ecf53dc2347b892e18691564c2
-
SHA256
b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01b
-
SHA512
d6ae05288d4721460a4676126dc55548427cf95071a6412ce767985b61ce429ae3d1780b46063f6853c81de905ef03c573d0d65775c13a8029072822a850fb08
-
SSDEEP
1536:ud9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:2dseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1868 omsecor.exe 2880 omsecor.exe 1936 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2556 b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe 2556 b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe 1868 omsecor.exe 1868 omsecor.exe 2880 omsecor.exe 2880 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2556 wrote to memory of 1868 2556 b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe 31 PID 2556 wrote to memory of 1868 2556 b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe 31 PID 2556 wrote to memory of 1868 2556 b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe 31 PID 2556 wrote to memory of 1868 2556 b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe 31 PID 1868 wrote to memory of 2880 1868 omsecor.exe 34 PID 1868 wrote to memory of 2880 1868 omsecor.exe 34 PID 1868 wrote to memory of 2880 1868 omsecor.exe 34 PID 1868 wrote to memory of 2880 1868 omsecor.exe 34 PID 2880 wrote to memory of 1936 2880 omsecor.exe 35 PID 2880 wrote to memory of 1936 2880 omsecor.exe 35 PID 2880 wrote to memory of 1936 2880 omsecor.exe 35 PID 2880 wrote to memory of 1936 2880 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe"C:\Users\Admin\AppData\Local\Temp\b21e8df9279fc8634113987252f62ff0235306b01931c99767140b8ae8a7f01bN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5af2cf09c6199bf9f26ce46bf479d429c
SHA1cf43a541262520e1202bcf17dba694a088d17cb2
SHA256dda355d805d9fa7d56fbcb14e26417239e14e7ce7395be5da20b038c257be8c6
SHA512faed24ca0bb97c8f06a4880b74242c053bb3034d049b3bbdef2822743a2e8d0431a2dfe96834d39f42d8637faf6290e67fbf2a2376da3986656f414be822621b
-
Filesize
80KB
MD535ce31206935a17719c65021a02f32e8
SHA11fedfa68520395b364fb0d4f57e6e95281670dcf
SHA256ebd31a0f1da882a8f584f966eaa7e4e160d5ff7c7106418b60943bf02e77090d
SHA512b336cd8011eab77485ef0e764d45ced16f8c926129d9aec9d6cd099e68503fbc33a6f1c7bdc27e3b9fe0341f027a68f0587c16b0fc6b6089879c94f1520f10b5
-
Filesize
80KB
MD5903dc67dd72e6e3736788c0fb958fb6c
SHA126dfe6108b0820a29d7a27fa9fa0fc8dba7dbffd
SHA256b720857027e18e1a5ec00aea23c478ae83dc6a1f7282980a89162d622a68801e
SHA512b93a6f2dba81809650f33f6de19f3290cabce535a371dff35dd90220fdc48efb5dc5a86d15ade5ed87f2dcd90b1cabd39ef347e3d37fbe66487e3809d01e800f