Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 03:03
Behavioral task
behavioral1
Sample
eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe
Resource
win7-20240729-en
General
-
Target
eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe
-
Size
80KB
-
MD5
518e6b9d214afd8d61414dbbb36e505d
-
SHA1
7f4f90331832ff8df74bf89ad116570543e3bc16
-
SHA256
eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5
-
SHA512
29a11dce3a7862e726cabe8245528af47bd8288a47004675bb40d8c3972d9445b81b81dbe01d142d58536b6ae889bc1e70d9def8ddd96e3036a67268f84473be
-
SSDEEP
1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:bdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2796 omsecor.exe 1968 omsecor.exe 1476 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2108 eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe 2108 eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe 2796 omsecor.exe 2796 omsecor.exe 1968 omsecor.exe 1968 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2796 2108 eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe 31 PID 2108 wrote to memory of 2796 2108 eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe 31 PID 2108 wrote to memory of 2796 2108 eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe 31 PID 2108 wrote to memory of 2796 2108 eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe 31 PID 2796 wrote to memory of 1968 2796 omsecor.exe 34 PID 2796 wrote to memory of 1968 2796 omsecor.exe 34 PID 2796 wrote to memory of 1968 2796 omsecor.exe 34 PID 2796 wrote to memory of 1968 2796 omsecor.exe 34 PID 1968 wrote to memory of 1476 1968 omsecor.exe 35 PID 1968 wrote to memory of 1476 1968 omsecor.exe 35 PID 1968 wrote to memory of 1476 1968 omsecor.exe 35 PID 1968 wrote to memory of 1476 1968 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe"C:\Users\Admin\AppData\Local\Temp\eb97754d04e56e7e6f00cb03bbd05f0923fc0403f2ecbfb9efa090c890b25ea5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b2ad24feaa73865d2050d9e5cc01b0ef
SHA1353b9cf1b23ee96175bbb04298bbf6922e8940dc
SHA2562ec248bc5ccee7a88cc503c96941927c38088b90ae0f524b7f20b9a4144d7a31
SHA512e022d5d0c01d8d13c7997fd202874b31f11b9d4d437f9f556c2d068f1909c747f799d883dcfaf91d979242d0844e620335e7a3dfbb5a93d304e53db6b1eb9ef5
-
Filesize
80KB
MD55ab603207d639795b63f2a9afea12132
SHA17d974be3b91c59097e34d7715fbc64adefd1a50d
SHA256c39fbb13554db4286e8647336a3447ddab08f4f4a95e183348aa7152c0d39a1d
SHA5123166c7a1ec85d32b6099203b1c376f33dc46df39ff043230e80fd9ce265d59331fe901d8e117f79eb54d97885f9c69dfdc86fac4da9ed99b7102851473cb1684
-
Filesize
80KB
MD5c319c59f381ac9f729991f3575b104ea
SHA19d2bc9afa3cb02cce572c9fa12d897417e8bd808
SHA256cbf98e53dd2acd9c3b1e395523f0f20d801ae3b26c1f9b7787496324d6b2ad28
SHA512270873939798f49e164853b95d40c56953adeb918ad61d668efed4ceb1fdbf96b51031466e9aead09e500000de1682deada9fb918feda3e703fe756e2cb9c19d