Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 14:04
Behavioral task
behavioral1
Sample
7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe
Resource
win7-20240903-en
General
-
Target
7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe
-
Size
80KB
-
MD5
142f51eb666fc454a719a3578f06a290
-
SHA1
94b3b550600648890fb33ebf440c3e806ecb4090
-
SHA256
7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077
-
SHA512
ff49f65987b905945529b406dad26b044fd95b2a5f8948a32080f064d1cd531fede8470a2ffd772709e4d14d3b16defd84676c1d90400e27d4b92f34d6753889
-
SSDEEP
1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:bdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1160 omsecor.exe 1976 omsecor.exe 896 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1696 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe 1696 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe 1160 omsecor.exe 1160 omsecor.exe 1976 omsecor.exe 1976 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1160 1696 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe 31 PID 1696 wrote to memory of 1160 1696 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe 31 PID 1696 wrote to memory of 1160 1696 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe 31 PID 1696 wrote to memory of 1160 1696 7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe 31 PID 1160 wrote to memory of 1976 1160 omsecor.exe 33 PID 1160 wrote to memory of 1976 1160 omsecor.exe 33 PID 1160 wrote to memory of 1976 1160 omsecor.exe 33 PID 1160 wrote to memory of 1976 1160 omsecor.exe 33 PID 1976 wrote to memory of 896 1976 omsecor.exe 34 PID 1976 wrote to memory of 896 1976 omsecor.exe 34 PID 1976 wrote to memory of 896 1976 omsecor.exe 34 PID 1976 wrote to memory of 896 1976 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe"C:\Users\Admin\AppData\Local\Temp\7b877951f82fcfb7184c3576224b3bfb53fbb641b9aa6f472b9d162dc7e5d077N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:896
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD58e1163f852d63b0232110e06ad1a21fa
SHA115adaf52ec6662d08369cf6536dc6e9f0d7f878e
SHA256b2d51585811e81f7e0b51a0c0239d0befce45af1475326052f87731cf94e8f37
SHA51221be974b9610bb36bacc29be7eed22dd1702ec55b1d862aba6b3780b3f9b41949cb0b1b1f559d6289a057238873cdb1ca2a313795527c0d21ee30efe475233ec
-
Filesize
80KB
MD553528c4f96048eb77174f50cc8da27d5
SHA1c3dee155f7dec1ee9d1cd5703bc4068571627552
SHA25662e36c31e403163c47e61f1f1c57aa08901ff23c64aefc509f8e8226e616f1e4
SHA5128eb5b98dc2d65dbc44fc2be6a141ebbe6c6c2227c5992626c01f5e5fe48abb7007304dd16b4088bf2d9f5b77d5f2cd23a2362f47fb8e742f1c464b1c62f06235
-
Filesize
80KB
MD55a6c8a3286f73a811d5ea10c9fe35719
SHA1fe1fe73900298920d6fd3610fdbe3c3bb7c92753
SHA256dc57a81eb803fe8b6180da0e94c65d196c8ea3b2d3715b81702fe977d79fbd73
SHA51277947d4e0e9fbfce97d8763c375f1a60ac4f2055932057b310ad3fab3d4b309424850e97b7e12191264458eab87d515ed6ec860728479357ec663de5cb681c4b