Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 02:52
Behavioral task
behavioral1
Sample
88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe
Resource
win7-20241010-en
General
-
Target
88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe
-
Size
71KB
-
MD5
e8dc9d201c76c5bb9382f4d38a4999dd
-
SHA1
2d159067ac6b373305858c39b0b7b13fb47b7200
-
SHA256
88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93
-
SHA512
39930cd1a9e39bdb2ea261a9ed82fa177dc355cce55a416e6d658d85c10581b430a23a93ed3fe30538823c641dc3282dde149587f425b8490e10e2b5c2488fe1
-
SSDEEP
1536:yd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHX:CdseIOMEZEyFjEOFqTiQmQDHIbHX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2616 omsecor.exe 2660 omsecor.exe 1196 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 1560 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 1560 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 2616 omsecor.exe 2616 omsecor.exe 2660 omsecor.exe 2660 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1560 wrote to memory of 2616 1560 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 30 PID 1560 wrote to memory of 2616 1560 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 30 PID 1560 wrote to memory of 2616 1560 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 30 PID 1560 wrote to memory of 2616 1560 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 30 PID 2616 wrote to memory of 2660 2616 omsecor.exe 33 PID 2616 wrote to memory of 2660 2616 omsecor.exe 33 PID 2616 wrote to memory of 2660 2616 omsecor.exe 33 PID 2616 wrote to memory of 2660 2616 omsecor.exe 33 PID 2660 wrote to memory of 1196 2660 omsecor.exe 34 PID 2660 wrote to memory of 1196 2660 omsecor.exe 34 PID 2660 wrote to memory of 1196 2660 omsecor.exe 34 PID 2660 wrote to memory of 1196 2660 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe"C:\Users\Admin\AppData\Local\Temp\88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1196
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD54ba1b7311a99bf6ec55a71d80e3bfcd4
SHA178ac1febd0646a20b388cdcde2f4cc12538d5c3d
SHA256d8bd9054f946aebaa67433dac36660f2d10941345451f93ded706bdd58edcab2
SHA51242e42c53a2afaa8d6876ca8d023b111b3e0ef8ae28b97def10c6161b43522c73a2a7d4c877de0d0c9cdd48d9b4731f14e8ba7bd5acde648ab26292f9ced3768c
-
Filesize
71KB
MD5d3ef8aa0925f2b69d985abad3a36f9b9
SHA120ff1fa1e34e2589ee0b75387c71eda82ba46eef
SHA256241a90e6c74c04febcbe8c2677f1db5d6b6b9bc93989b942ca71d259cd5ad6c5
SHA51277702d03c05572cab7e4bd08dffa959108d2b3c90c4ba4a2d4ae3bdb56b35341057329c9da117cde61b77290a15c34398305fe83bfdb5e80377e519168f6fb7c
-
Filesize
71KB
MD558f389bad08210f7039d58dac44b1497
SHA1cde5563e51dd334ea43f6393b7443c4b9d1611ea
SHA25677280a71135d3d433eb0845ca344e53eb75dd194192bb0edcd27e794d5164b5f
SHA51246263a195e8b4e037af5265ecf72878c20743ee6618305cb6020d0e8254c26e668fa1d0d5b60f7030116ae9a5fa0b890e303e85b64a50504e07d60e20571a4e1