Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 01:42
Behavioral task
behavioral1
Sample
aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe
Resource
win7-20240903-en
General
-
Target
aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe
-
Size
80KB
-
MD5
3ffb0284778f950150c4e19aeadaffe0
-
SHA1
43d55831703b9d8db52ef3776705e0cc5bb7cc35
-
SHA256
aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755
-
SHA512
2c7ea411a9712521bf38848d359d92bf5a86824e3ad0f6f1fa2b486075f5972447c468a4542c8a15a9bbd4fcf27c1e0ecda9edf505291e92e9dde00873d39224
-
SSDEEP
1536:wd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:wdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1868 omsecor.exe 2932 omsecor.exe 548 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1224 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 1224 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 1868 omsecor.exe 1868 omsecor.exe 2932 omsecor.exe 2932 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1868 1224 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 31 PID 1224 wrote to memory of 1868 1224 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 31 PID 1224 wrote to memory of 1868 1224 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 31 PID 1224 wrote to memory of 1868 1224 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 31 PID 1868 wrote to memory of 2932 1868 omsecor.exe 34 PID 1868 wrote to memory of 2932 1868 omsecor.exe 34 PID 1868 wrote to memory of 2932 1868 omsecor.exe 34 PID 1868 wrote to memory of 2932 1868 omsecor.exe 34 PID 2932 wrote to memory of 548 2932 omsecor.exe 35 PID 2932 wrote to memory of 548 2932 omsecor.exe 35 PID 2932 wrote to memory of 548 2932 omsecor.exe 35 PID 2932 wrote to memory of 548 2932 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe"C:\Users\Admin\AppData\Local\Temp\aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5d214a002d9b5dfea595db8c4fcfb1e38
SHA165b38b571c758c57de4a836c63c1fd6e089cbc80
SHA256ea23b045e0c0afabe4084016b3701135776e19a5f1afffa97533abcd8395cdd4
SHA5122eeeb3746a4cc95ffe8ef27d8f2ee203c2a5da357fd19a805e791cb27c73450d6cacfe97e708ea3947f10a720b45e089d0a190ad7ab151ffee9129db89a7458c
-
Filesize
80KB
MD50c4f3812bb0f78271b40fa5f4d32dcc5
SHA1d776302f8e9702f03f998e222a197fee78c51303
SHA256de7871ac868c59b741b0c6dc05a8ab36be9e73b7126daa7a42b61033d2e92a0c
SHA5126b0d4d755e012da7ee3a268667148633694e681feb19f658cb9810a5f8d70306cf9e079a5ebd0e94baa485e53587a5ab611e5b65bfcca78898a579e59d6e4789
-
Filesize
80KB
MD59ad24f431478e2c72a09bd6b1422edee
SHA19264cea5edb35f7bd47a47843a653e739cfc2f3d
SHA256289ca7921f133cf16f1f702cb41fd1621ecc68a3cbe4ee0eda12484363ab1a5f
SHA512f6f47aaac0a05de12133c162ded3508bd3e226fd3fe6af6108ed8dd1388ee80b7e65dff50517d949d0af8c8cf82e9809bcea93c2abeffd7019aab68ce0c4b06a