Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 05:46
Behavioral task
behavioral1
Sample
dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe
Resource
win7-20241010-en
General
-
Target
dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe
-
Size
80KB
-
MD5
795f2d2e2962e83c62eaac64a020763f
-
SHA1
bca9efebd53235dd835c1534a0b53a9f58a6fc6f
-
SHA256
dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a
-
SHA512
a8c90d2cdcd4f51296dd0d7561b085ea7c776d6a3fa213256d26df6820cacc472fedd976110ce407bc77ce24fe1d42ac922ce46c2a72a906805c42809c1fa34b
-
SSDEEP
1536:Wd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:udseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2684 omsecor.exe 2868 omsecor.exe 2520 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2780 dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe 2780 dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe 2684 omsecor.exe 2684 omsecor.exe 2868 omsecor.exe 2868 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2684 2780 dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe 30 PID 2780 wrote to memory of 2684 2780 dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe 30 PID 2780 wrote to memory of 2684 2780 dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe 30 PID 2780 wrote to memory of 2684 2780 dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe 30 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2684 wrote to memory of 2868 2684 omsecor.exe 33 PID 2868 wrote to memory of 2520 2868 omsecor.exe 34 PID 2868 wrote to memory of 2520 2868 omsecor.exe 34 PID 2868 wrote to memory of 2520 2868 omsecor.exe 34 PID 2868 wrote to memory of 2520 2868 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe"C:\Users\Admin\AppData\Local\Temp\dbe250885f238b504e3737d38447fb01093f93d118c332841b2e8892e964258a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2520
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55bbe6946a8f827a135abf8b68fa6537c
SHA1a7f92e3535de609bd37ddca11248fcf343228fdc
SHA256084929250ba6eaf5c333f24ec78cdd96393b59e950d054bf38a656d44ae3c8a0
SHA5122f499c1f93471218db24b6e48d5909ec3e8c8a09061f53cdc5985925c628c2049b94873b421d64b5296645546060689be272149a6b4b6122b7e015abd17af822
-
Filesize
80KB
MD533bd80b6b176d6cb878fecb0d76ce334
SHA12f8983f74fd27909a13fe5baef88f20d56fd770e
SHA256b919e9e48c5dcac0132670cc1c41773125da8e613e6b3efbcaaf7099caed3e34
SHA51226cf55863a087f85fad2142bc2dad0eaf5ccf5ce721686f25b68c353e1710c12df5ac70d53bd6cc706a1b5da32e16f2ff3ba8c772adb1c2db35ad4054a0c02dd
-
Filesize
80KB
MD54ae74d8fccbb574cce44f9c2e58e57ca
SHA1b9ca0501b48844c042164bd02e9b471bc372e6ea
SHA256efc4d14910505d220b650e25e5b23214736e872b7873730bf28f24e08b948fda
SHA512fb716f47105ed7178d12ebfdacee1a8837cf9024848171c9742d2f9de9a754abbac8ac21d9e9290b815a9f9e3014aa65140a84c1435b1dd53537ba1a9a03e492