Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 04:55
Behavioral task
behavioral1
Sample
eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe
Resource
win7-20240903-en
General
-
Target
eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe
-
Size
88KB
-
MD5
ba22eee6c9fb329301817a2ecc56e943
-
SHA1
bdd2a764fcbf8c16671c4997be14c013fb30f5be
-
SHA256
eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827
-
SHA512
73e46feb3babfae0ff107fe83f23ee9dfc013e74327df61f20c596f820d6568013343c4db07ffa77716d79102e6420af1756a172c8938f3caedd6e7b0975634a
-
SSDEEP
1536:ud9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5Z:2dseIOMEZEyFjEOFqTiQm5l/5Z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2212 omsecor.exe 3060 omsecor.exe 2616 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2848 eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe 2848 eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe 2212 omsecor.exe 2212 omsecor.exe 3060 omsecor.exe 3060 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2212 2848 eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe 31 PID 2848 wrote to memory of 2212 2848 eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe 31 PID 2848 wrote to memory of 2212 2848 eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe 31 PID 2848 wrote to memory of 2212 2848 eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe 31 PID 2212 wrote to memory of 3060 2212 omsecor.exe 34 PID 2212 wrote to memory of 3060 2212 omsecor.exe 34 PID 2212 wrote to memory of 3060 2212 omsecor.exe 34 PID 2212 wrote to memory of 3060 2212 omsecor.exe 34 PID 3060 wrote to memory of 2616 3060 omsecor.exe 35 PID 3060 wrote to memory of 2616 3060 omsecor.exe 35 PID 3060 wrote to memory of 2616 3060 omsecor.exe 35 PID 3060 wrote to memory of 2616 3060 omsecor.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe"C:\Users\Admin\AppData\Local\Temp\eee2a6a681d331529e8ace75d539138207d220ba82dc4bb89d07cc792af66827.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5a359efde16eaaeda5f2793998f58e287
SHA17e0d11d8c746ca53078d709f33856a901a127467
SHA256932e51735d3b5034e787e5db83602eccc7a412cb0af68a994006a2a41af8ec21
SHA512c2c974495cef7a635358f201ce543368312f2e58550e71d788c31d74da5e97cdf595ab62b1cb6aeed2be57dae83fd7d0fc6d3188985d4335c16226cfa74cd2d1
-
Filesize
88KB
MD5daf5883ff36c6070c70c2325e4979aef
SHA11c52885a8a0ac5e145f50a9c934f97a69e981c52
SHA25605f91406cb47d7d77198e598b71b254a074c79d20dfd2184efa566eb4116a272
SHA5126ffbc858b36ff5b65b6defb55d7677ad1b9355a0e6f6599c4d7aec6da665631aa272c7f31b6c1402efd8d4d3b212e53fae9392127bec6db5b24112aed1824a0e
-
Filesize
88KB
MD5ce23c9724105bfa1caac2b6bb5003cbe
SHA13de8076c408a8add1ba4c8e94024ca50d966732b
SHA256ae3001895e807220ee9c7d843202bf952b42e6a4a96fbbe1f13720c84d686d3c
SHA512010a4615d95495b2ef272f73c85fcc90891bcb1ea6b8b9aaae7c0643f0d2ad4cd86be52e00d04faebcc95cc0ab8bbeb57d9e853c206e521ef2512a437de451a6