Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 01:22
Behavioral task
behavioral1
Sample
42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe
Resource
win7-20240903-en
General
-
Target
42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe
-
Size
72KB
-
MD5
462c26d322751a036b3fca6c67ec4100
-
SHA1
77406805b377828f901652d298c88824684320b0
-
SHA256
42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2f
-
SHA512
ef1e73d9808489dfc011a40d36e2de3b4642abe4000a60b552cc5cb9068982626ec2a81a720f1f4b166fa45c8c53eb2f4e4f967931340eaf93cd78e19d0b8cbd
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211H:RdseIOMEZEyFjEOFqTiQm5l/5211H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2968 omsecor.exe 2848 omsecor.exe 1808 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2944 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 2944 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 2968 omsecor.exe 2968 omsecor.exe 2848 omsecor.exe 2848 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2968 2944 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 31 PID 2944 wrote to memory of 2968 2944 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 31 PID 2944 wrote to memory of 2968 2944 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 31 PID 2944 wrote to memory of 2968 2944 42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe 31 PID 2968 wrote to memory of 2848 2968 omsecor.exe 33 PID 2968 wrote to memory of 2848 2968 omsecor.exe 33 PID 2968 wrote to memory of 2848 2968 omsecor.exe 33 PID 2968 wrote to memory of 2848 2968 omsecor.exe 33 PID 2848 wrote to memory of 1808 2848 omsecor.exe 34 PID 2848 wrote to memory of 1808 2848 omsecor.exe 34 PID 2848 wrote to memory of 1808 2848 omsecor.exe 34 PID 2848 wrote to memory of 1808 2848 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe"C:\Users\Admin\AppData\Local\Temp\42a2c7119345fb0f08927d41a1ad35a8a7fe4c8f31c599877f857ba7937a4c2fN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58979b0cf57f3afb2a76dcee8eea1d2bf
SHA17dc55aeac9dfbfa65aaa41ca4e98de17064cbdbf
SHA2560a0fe481d8fb902ac6880fe1a559427bb85deefb56964edbb766e0427249ece5
SHA5126b2fb8b2337811263e58ae0a47d08694ae4a2a50999d030ba33b0dd580fcba6b56ec9fea56b70b63be7c53b201c27cc39c4df095f2fa90b7b231f20fb56b9506
-
Filesize
72KB
MD5c8ef87cf24a9637b0d656ff0f9084600
SHA1813fc86edd7c69be50d2947ac9f4c2c680aeb9c0
SHA2564aeec3bfa2428e70e1225c83e380c5f2f50ad23c3dc9187c39bd16f90996650b
SHA51263ef4bd2e0510a88c6c10bc91a95cdf8ebcb015949a29a2843c045b9a5f535cd3a5b07ac816ebadd3d96bf113656fdac6d6132aeebd15baef96a390040225888
-
Filesize
72KB
MD533034129f535e614dc8bc758e70246da
SHA16865a2d01d476cdd813c461dc0e5b6d81de8b2d8
SHA256b69a6df124a86571c3d5202db608ac86aaba02727302154e6e353e6e3e203860
SHA5122fb64d3c1e3a5300547731cc1a6accf99aeb2ba88d1d91c922851049ac2095852e57c605f0a0c4ef114aba949820d4f1dc5c5bf17d27bb5c3bb0fa00dce48d79