Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 15:35
Behavioral task
behavioral1
Sample
4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe
Resource
win7-20240903-en
General
-
Target
4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe
-
Size
65KB
-
MD5
5a23b0173a338fbb8069cfe77346e970
-
SHA1
7c339674d04175cbf58af4d5399311db4f4b6fd7
-
SHA256
4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2db
-
SHA512
828040bc301948c8164082f75f69240bcdb2ec50ea2af95d22ae189c935e7b1b34a0c21d3d0405dda2c96ad4b56333b2c75b3a90a9ee4ddde0f2918f80808c27
-
SSDEEP
1536:nd9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzg:PdseIO+EZEyFjEOFqTiQmRHzg
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2756 omsecor.exe 2052 omsecor.exe 2768 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2700 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe 2700 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe 2756 omsecor.exe 2756 omsecor.exe 2052 omsecor.exe 2052 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2756 2700 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe 31 PID 2700 wrote to memory of 2756 2700 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe 31 PID 2700 wrote to memory of 2756 2700 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe 31 PID 2700 wrote to memory of 2756 2700 4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe 31 PID 2756 wrote to memory of 2052 2756 omsecor.exe 33 PID 2756 wrote to memory of 2052 2756 omsecor.exe 33 PID 2756 wrote to memory of 2052 2756 omsecor.exe 33 PID 2756 wrote to memory of 2052 2756 omsecor.exe 33 PID 2052 wrote to memory of 2768 2052 omsecor.exe 34 PID 2052 wrote to memory of 2768 2052 omsecor.exe 34 PID 2052 wrote to memory of 2768 2052 omsecor.exe 34 PID 2052 wrote to memory of 2768 2052 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe"C:\Users\Admin\AppData\Local\Temp\4560e75e744285616a87a122a107ebe30b04f96ac3a8f98bc3001f22b791f2dbN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5e30fc56ea97508fbe4312a8549ab6b73
SHA1c1688892aaee4df32d3db50a0796323ae355bd34
SHA2560733abd1154328bb9bb6e073120f8bef72188e70ad771312b553184aeb4e12f9
SHA51262200212e3f641808d6b9a42756d5215c5fd4536b6eefdef28ef682c36739c00bf9a96933574b599dac64866e81e97a0d690ac9ec912f9c9df397f270aec6441
-
Filesize
65KB
MD522ed92d832ce774e828957f911310595
SHA19299930b706aaf6ec8bc86fe9f44726da151ddd7
SHA25677a1504dca87d6e5bb2bf8df56a10cfa74802191d50b39eee69ae405f0600707
SHA51227001b1c4ca8d78d91efe73684cf9bb9e436dcabb1f3512ae4943f9a48c90e7e95ff4692241256635d0c51b0e8f341e3647274a016756fe64089917ea71cfcff
-
Filesize
65KB
MD56da753ffd6a4fdda46a70893259ce652
SHA12452db0ca0da0a68f50c253f8fba93107faa9176
SHA256de5f646f77d799c90c6d5d9498065bcb1335a7e56a238749792961dfb17cdd6a
SHA5120aca560a993b3ab761c370faa722c4381a3960b17604f2b55aaf1cb1406e37c3842768c288043f9b0a4d53c681092ce9c7a14456bf335e6d03919490c9f226df