Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 08:14
Behavioral task
behavioral1
Sample
4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe
Resource
win7-20241010-en
General
-
Target
4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe
-
Size
61KB
-
MD5
fd6ee9c57884f8799dde7a08730562bb
-
SHA1
a4188254326ac445ff34e2598306eb1a674ee0fb
-
SHA256
4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c
-
SHA512
b0aa446eb93a4418757c7dffd59cfb0174b755ed4a6fe20b4079a59c8b4b17c42b56f4a4d1f7441156d78876478e84d1913bbaec469cbb6a640091f85cbd3705
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZll/5t:cdseIOMEZEyFjEOFqTiQmPl/5t
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2872 omsecor.exe 2064 omsecor.exe 2952 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2708 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe 2708 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe 2872 omsecor.exe 2872 omsecor.exe 2064 omsecor.exe 2064 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2872 2708 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe 31 PID 2708 wrote to memory of 2872 2708 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe 31 PID 2708 wrote to memory of 2872 2708 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe 31 PID 2708 wrote to memory of 2872 2708 4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe 31 PID 2872 wrote to memory of 2064 2872 omsecor.exe 33 PID 2872 wrote to memory of 2064 2872 omsecor.exe 33 PID 2872 wrote to memory of 2064 2872 omsecor.exe 33 PID 2872 wrote to memory of 2064 2872 omsecor.exe 33 PID 2064 wrote to memory of 2952 2064 omsecor.exe 34 PID 2064 wrote to memory of 2952 2064 omsecor.exe 34 PID 2064 wrote to memory of 2952 2064 omsecor.exe 34 PID 2064 wrote to memory of 2952 2064 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe"C:\Users\Admin\AppData\Local\Temp\4ae3d4a1d7f02a18293b921396edf6c954a41b2d61ec817ce5f696b75bdf468c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3bb36562bd54fd4785a536b098d74ce
SHA10a51862b47d5b5a29a44355d070c7b5797f416b4
SHA2569735c90d6da7324df3a613e013350e3a12ba51739243a7bf4c8a8aa26d0165af
SHA512c9fef6b1a0eb91b8a0c5ea0c8ff4f12d9e74780ca0e0bfd3daa601aeda9561c355a0a7a1fed92f0e8a69a1d6a0d3ba2d971f5c1178e1a0e8d763bbf41b40b8fa
-
Filesize
61KB
MD552f7e0def11157758678ae45b8d468a7
SHA1f0fc768ae487e3b83b9902a4343678ea0495dd7c
SHA256faba59b0f26e38f997658d479c2e7f200103a00c03c993fe93af86d7c11e927b
SHA512fecdde9521a64f3fc1926585b09ec5797b3f909cb33aa2c8ac18aad50a0fa4521531ea2afe70ff9ae5bfb327c341c9f2e797198bcf2ab455475e6bc8e01931a7
-
Filesize
61KB
MD50cb65e8b98d22853681e11b02bbe4f04
SHA1c36a0f9d5092eb68bddc1f6ee423d0b18927053a
SHA2567dfd4f85f392c3889af51688d5676ed36c38a029f28856980a2bf836e31095d9
SHA512a99ecf940dfc7f1d298452812f4850143c98098d76ad805c1ddc5eeacadd85ca82ddf551853462cb235aa3707b83f0d4b17c8ed19f23e6b0945d70f88afd8fe1