Analysis
-
max time kernel
106s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/02/2025, 16:04
Behavioral task
behavioral1
Sample
3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe
Resource
win7-20240729-en
General
-
Target
3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe
-
Size
65KB
-
MD5
19255e5e980f89de04e27620c89e2830
-
SHA1
8db7f1e832bb88562f241d1bc178fcfa2819f4fb
-
SHA256
3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785e
-
SHA512
3c3e6298e213473f9ef2fc883770a96fbdda0c6b301c931637139df8bca18a08a9ef9d8c3b266fbfbd50bc0926807e401cf70f51f74262d2f60062be2aa1030e
-
SSDEEP
1536:md9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/HzF:edseIO+EZEyFjEOFqTiQmRHzF
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2900 omsecor.exe 2860 omsecor.exe 1784 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2508 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe 2508 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe 2900 omsecor.exe 2900 omsecor.exe 2860 omsecor.exe 2860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2900 2508 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe 30 PID 2508 wrote to memory of 2900 2508 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe 30 PID 2508 wrote to memory of 2900 2508 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe 30 PID 2508 wrote to memory of 2900 2508 3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe 30 PID 2900 wrote to memory of 2860 2900 omsecor.exe 32 PID 2900 wrote to memory of 2860 2900 omsecor.exe 32 PID 2900 wrote to memory of 2860 2900 omsecor.exe 32 PID 2900 wrote to memory of 2860 2900 omsecor.exe 32 PID 2860 wrote to memory of 1784 2860 omsecor.exe 33 PID 2860 wrote to memory of 1784 2860 omsecor.exe 33 PID 2860 wrote to memory of 1784 2860 omsecor.exe 33 PID 2860 wrote to memory of 1784 2860 omsecor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe"C:\Users\Admin\AppData\Local\Temp\3e306bc987f3a6beaf4882940c3db56d22d30b4c19b7a66ad896644093a3785eN.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5f358a8829eba96abf0f0ee1effe972d1
SHA1160ee23ba917a1b24425c1a2e63c135a39b24bef
SHA256e3c9f243aa707b478218b4ca56876abcaf9512ccd2dff9b695b12174ca113faa
SHA5129067fbd0ade14826c3340682b9f4f44a507ef941042f18d57565240c88d1925fd99e7a4b86fe0704ac3a86d62a8a36b573fa02b3b3fcad75014053a46e4656be
-
Filesize
65KB
MD57e2cb7bca37b9e114ea8315d51532f75
SHA1cd42ecb81c668e38c8be4a3f9e70d0e5e232fa19
SHA2561f1c82051826265c5341a2b969dc3e84293400465718903d8d8b1d67631a7186
SHA512604a16de1b4b9d04bc9fe09dbbb0341b2d58b192dc84321ccf9e56eac71f2dee05875b725288c82d4922aedf2f2f5abfe3e4bc0748d2b03a0a90dbafec121ff8
-
Filesize
65KB
MD5f620be22de2955845b34b29f0695927f
SHA14ee30185567d6be0e2ee80c498991fd19fbcef7b
SHA256e020c86114cf1cf64e8481ad396c472909af4e4a916f1edb2b160e3cf5dad846
SHA51250111f064619afea26d312dc04cbf9128f5701ad156b145fbe77d5c0b672489231d0a41883cbd932c8c468f42859052b4e718c61777129fa748bee3f2a29e3c3