Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 10:28
Behavioral task
behavioral1
Sample
c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe
Resource
win7-20241010-en
General
-
Target
c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe
-
Size
88KB
-
MD5
e9fc44453f841d897b6e41a344acca00
-
SHA1
5f54d50d83e0ec1c847b6579e9b787855d1dd34a
-
SHA256
c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78
-
SHA512
62551e67749b6f143613fad524111adcb22bed70648b662438bc139563c085403f8003aa1e2d52e00ef41a78ad2d8ab1dd3433bd80594412dd910cc97f2853d3
-
SSDEEP
1536:nd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:PdseIOMEZEyFjEOFqTiQm5l/5h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1248 omsecor.exe 980 omsecor.exe 2920 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1196 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 1196 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 1248 omsecor.exe 1248 omsecor.exe 980 omsecor.exe 980 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1248 1196 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 30 PID 1196 wrote to memory of 1248 1196 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 30 PID 1196 wrote to memory of 1248 1196 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 30 PID 1196 wrote to memory of 1248 1196 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 30 PID 1248 wrote to memory of 980 1248 omsecor.exe 33 PID 1248 wrote to memory of 980 1248 omsecor.exe 33 PID 1248 wrote to memory of 980 1248 omsecor.exe 33 PID 1248 wrote to memory of 980 1248 omsecor.exe 33 PID 980 wrote to memory of 2920 980 omsecor.exe 34 PID 980 wrote to memory of 2920 980 omsecor.exe 34 PID 980 wrote to memory of 2920 980 omsecor.exe 34 PID 980 wrote to memory of 2920 980 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe"C:\Users\Admin\AppData\Local\Temp\c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5b504d8ca067b5099f733450555fafc83
SHA10a2146d692058d0d80360ac2dd87a1697d7a46b5
SHA25601385a1712218d6d9bf66ac3988999712c94997cd6d04e0fdb64127139bb490d
SHA512d242523a100d9e02118a7219fbd1a9b19134afe46c99d2d2c821605fa96ecdec1d5140050fffc206cd2e20cff2b6542a976a4b5325e63d2c292b2c972fbc702a
-
Filesize
88KB
MD54ff3af1844be2d0d22edf8f88bd61193
SHA1a389dad5c9e627a427d04aa29011020785eecfe8
SHA256c8cacf600c3f78f2665c51f62a989be8c6b6aafa703e8e5e9160ed4f20289bab
SHA51294ea57e69eb8c14f80db51f129dedba9c461e3dd676924b1553909450d0eba913059a2896dde482ab8710299383b25391fafe1a39c24eecbe89b2151360a3af2
-
Filesize
88KB
MD56b1ace1345b5d9fb8a9d2856453ed396
SHA1b32fe0c6d82253c0f11cab85c0893238a5ae6789
SHA256ab064e0445162c84c29c5c954cf3b3e7b6c71d904b1e17c0b3922bf2826586c3
SHA5129b43d865c96c2578fded4538ebdcf11197d5b50fd49ed5666cbadca8763eafe4e472a979a9635259cfd624b576b433b611b4f12f0794fe6452a64b8f3ebe10c7