Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/02/2025, 04:38
Behavioral task
behavioral1
Sample
afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe
Resource
win7-20241010-en
General
-
Target
afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe
-
Size
80KB
-
MD5
5f37185a894e45cbde1eed03f43d8ddd
-
SHA1
b199139af55a447b1ff2a4f8bf7d7085ac2035ea
-
SHA256
afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec
-
SHA512
bde058e8bd10231e12572536fdd6a8c47798df152d7ce518498fd843df6158c1eec6dcd5b274b70e1736d54ad51dc11c76c8cdfd7062e056c438f6e7a749706d
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:DdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2224 omsecor.exe 3020 omsecor.exe 1832 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2044 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 2044 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 2224 omsecor.exe 2224 omsecor.exe 3020 omsecor.exe 3020 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2224 2044 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 30 PID 2044 wrote to memory of 2224 2044 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 30 PID 2044 wrote to memory of 2224 2044 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 30 PID 2044 wrote to memory of 2224 2044 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 30 PID 2224 wrote to memory of 3020 2224 omsecor.exe 33 PID 2224 wrote to memory of 3020 2224 omsecor.exe 33 PID 2224 wrote to memory of 3020 2224 omsecor.exe 33 PID 2224 wrote to memory of 3020 2224 omsecor.exe 33 PID 3020 wrote to memory of 1832 3020 omsecor.exe 34 PID 3020 wrote to memory of 1832 3020 omsecor.exe 34 PID 3020 wrote to memory of 1832 3020 omsecor.exe 34 PID 3020 wrote to memory of 1832 3020 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe"C:\Users\Admin\AppData\Local\Temp\afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD58cae328c26921608221cec925a9ea554
SHA1697acdd8f360d5aacf94f0928c81eb04225bcc07
SHA2562cf31c4f624970c2e587eca799212dba60b29d48bdd3f729e46538e7dedd64ea
SHA512978fff2a5b631d8a8366a32dba4859624353f2bf15d183e79ab10fa5b147156eb3e7b5ad0848a0163668e968c6fc7aeb8d69e4d0bc2a6ac80f309894450f5aaf
-
Filesize
80KB
MD5f13b5b96875e1c0a8a9d09a44f8a4837
SHA13a7ebef3105f42441319ba5e3fda4c2fb8ae007d
SHA256f444f1782c0d3555b62a9398975fd271ce06a4d9ea2a908310073943284d98b7
SHA512a72562c822004b2178789a5ff6530183787ed7f3432550f3732d2d4fc5c9707ca375a6450ab27d849e94261ac0c55ff3d47e6c1d6c898fb25b15552599c09aa8