Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 02:55
Behavioral task
behavioral1
Sample
030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe
Resource
win7-20240903-en
General
-
Target
030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe
-
Size
80KB
-
MD5
f5c2078a68ff7a7a43e9949440b72a38
-
SHA1
b79de6391e4d24d33878c3ae63a2cf56f526775b
-
SHA256
030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f
-
SHA512
217fb9c0ed282060a2ecc2e25d534ebd63e6ab7a0831b992bb429cb1c0dc67b735b4e60e5d898b36a934b1fdf496c85130bac43c671c5b1cd61f012b7ec02d6e
-
SSDEEP
1536:ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzz:GdseIOMEZEyFjEOFqTiQmOl/5xPvw3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2744 omsecor.exe 2964 omsecor.exe 2148 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2484 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe 2484 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe 2744 omsecor.exe 2744 omsecor.exe 2964 omsecor.exe 2964 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2744 2484 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe 30 PID 2484 wrote to memory of 2744 2484 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe 30 PID 2484 wrote to memory of 2744 2484 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe 30 PID 2484 wrote to memory of 2744 2484 030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe 30 PID 2744 wrote to memory of 2964 2744 omsecor.exe 33 PID 2744 wrote to memory of 2964 2744 omsecor.exe 33 PID 2744 wrote to memory of 2964 2744 omsecor.exe 33 PID 2744 wrote to memory of 2964 2744 omsecor.exe 33 PID 2964 wrote to memory of 2148 2964 omsecor.exe 34 PID 2964 wrote to memory of 2148 2964 omsecor.exe 34 PID 2964 wrote to memory of 2148 2964 omsecor.exe 34 PID 2964 wrote to memory of 2148 2964 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe"C:\Users\Admin\AppData\Local\Temp\030f71ee2048d3c343437a7e3c7c8ba254db5360a464ca45a15aca1e5721011f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD571a35b4ee5a6ea8459dc74603912f9c3
SHA1ff7ada27bd90e53d1eaae7797b7e7382ad63bb9f
SHA25653f51786f6db1394c0782fa1f085fb3b12089fc70d129cab38bb1b544819648b
SHA512a590f2511838a436ee6ae681485f8f86552f7915b385212a7426ef8b844012b690f07f745c24c4d55005b1ad76057735d82189b9286477c830534da265ecb97b
-
Filesize
80KB
MD5ae3911ec12e9ae460d2307f9c1988d52
SHA13cf49a5b6be7cebca3d6b7fe359eb71d0baf1334
SHA2560a74ee1b315c8602d78214b8bf446ddfa7071f753d5bb2dcafc78e6f3972b86d
SHA512e9d1069bd35c2e5b1893fc3ee639fc0f244bb964065ece6cc1e57dd583e338ccf1a4eb72adab28455793325861f8f994720bcbcf77b6740b69b4d9f29f5e59cd
-
Filesize
80KB
MD5700454bfcdd68e1f3a5271d98e097f67
SHA130d9613729232cdcd45c965cce7b118eb1cffdec
SHA256da4b428afdf27120e4d5703e8afe841c72f4fb0d5b1632ad5b88e1651c69a1fe
SHA5124a1bfe4cb8b098ae7b9823a0e43e62278209484aed9082271a685d5d376881ba771f6d882e45eeaba2b20c3fe875a9a2940aa5b9aef789a5528746b9293f7783