Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 11:54
Behavioral task
behavioral1
Sample
b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe
Resource
win7-20240903-en
General
-
Target
b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe
-
Size
65KB
-
MD5
e46be8d0d00de9b46935c8980d1f3079
-
SHA1
4c639e0805c24b7ec0d7ae07a312927057ed4b08
-
SHA256
b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c
-
SHA512
72fadf5d855a0a83276c5abdd96dd87988baea45706911f0990b6211e8338c2097eab427b66bda0dc6ea5331cc160b79fc3ab33ef434bb50f2d8dfccae1a1d99
-
SSDEEP
1536:nd9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzw:PdseIO+EZEyFjEOFqTiQmRHzw
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2172 omsecor.exe 768 omsecor.exe 1560 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 592 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 592 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 2172 omsecor.exe 2172 omsecor.exe 768 omsecor.exe 768 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 592 wrote to memory of 2172 592 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 30 PID 592 wrote to memory of 2172 592 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 30 PID 592 wrote to memory of 2172 592 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 30 PID 592 wrote to memory of 2172 592 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 30 PID 2172 wrote to memory of 768 2172 omsecor.exe 33 PID 2172 wrote to memory of 768 2172 omsecor.exe 33 PID 2172 wrote to memory of 768 2172 omsecor.exe 33 PID 2172 wrote to memory of 768 2172 omsecor.exe 33 PID 768 wrote to memory of 1560 768 omsecor.exe 34 PID 768 wrote to memory of 1560 768 omsecor.exe 34 PID 768 wrote to memory of 1560 768 omsecor.exe 34 PID 768 wrote to memory of 1560 768 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe"C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD50578f6a6c66678a9287d8421caf3f355
SHA136b09c19bf699e9b8fc9dc2d8a36b0a655f85870
SHA2565367d4a148f0dcc07ac69ef08f9b9f9bd001276ae31636a4b5b12351e8b1c90a
SHA5125513fee263c5fd06fd7ec054efb1b8f91fd867720c71db4f68567f1cf7964825f17de8f5914b914b1c4780d431ad409ddb340fa1ac6aa8a334e4ab55e4e1b72e
-
Filesize
65KB
MD503ba3b3a97ac91407bd8e7ba9b5d6fad
SHA1d4d62070bd94a4f565e3fb4805411022396ae477
SHA25631ad91b5f81e01e0520e02ea6f0d5c72e4a02f8db4391c88276db4284be8de24
SHA512b2e8954b5c63a0ee34c76e2bfaec120a009eedada320631ac4f724470eb72c4fee11a640850ed0537645556be2296749fae3576e68bca4f20b98836e7bd8472b
-
Filesize
65KB
MD594668da05d5db517c1eec198022e9c29
SHA1886f30210be69760b7cbc5518bba29287f00b42a
SHA256b485c63e88ed49d8198b9f214920000321b8ee43ddefaf28acb5a00fde762a01
SHA5124ff49f94c93048f58c62c130a0f9b72bd225a0ba0c86c47ff3b86255ffaa79926cf4b431eec99712cfb4018dc279804852b4a1911b6611f0666bbcc2806b9435