Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/02/2025, 07:49
Behavioral task
behavioral1
Sample
f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe
Resource
win7-20240903-en
General
-
Target
f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe
-
Size
64KB
-
MD5
69f7cc6fd27e49643574afd0a282bbb8
-
SHA1
27fc663276af53968eee2628bd12596696200bfd
-
SHA256
f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f
-
SHA512
6e995f9342b251bfb45b9a883fb9f9842df6f7d6da0dfb6067b269e60c9f09d1390edc894385a679c1db8c22761ee357ced0d7f3c184bc3c0cc27ce3d484a477
-
SSDEEP
768:jMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAH:jbIvYvZEyFKF6N4yS+AQmZcl/5f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2276 omsecor.exe 1592 omsecor.exe 952 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2260 f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe 2260 f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe 2276 omsecor.exe 2276 omsecor.exe 1592 omsecor.exe 1592 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2276 2260 f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe 30 PID 2260 wrote to memory of 2276 2260 f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe 30 PID 2260 wrote to memory of 2276 2260 f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe 30 PID 2260 wrote to memory of 2276 2260 f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe 30 PID 2276 wrote to memory of 1592 2276 omsecor.exe 33 PID 2276 wrote to memory of 1592 2276 omsecor.exe 33 PID 2276 wrote to memory of 1592 2276 omsecor.exe 33 PID 2276 wrote to memory of 1592 2276 omsecor.exe 33 PID 1592 wrote to memory of 952 1592 omsecor.exe 34 PID 1592 wrote to memory of 952 1592 omsecor.exe 34 PID 1592 wrote to memory of 952 1592 omsecor.exe 34 PID 1592 wrote to memory of 952 1592 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe"C:\Users\Admin\AppData\Local\Temp\f415a9ac440615626abc26beeb5ffe0ca3647b9a5c9d549a102cda5ceeeac60f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bbd228adbe5d52b27549643a21bcc571
SHA1044e4598c888ca270ba929f568cd892a7ae89362
SHA256ec6c28bc8384d6afaf21a20e86c72a66745d69cc576f93c0876dc26245376653
SHA5124ec61c76e627e1bfebbc39e3e4e82ecd98869a3bf0747610659100b57fa555123b5053fa7711bed8e9f15678e786ae751cbfe8a376505f78552424128a0dcbc8
-
Filesize
64KB
MD5038ef208d6ef3b924c141a15a913cdd2
SHA1ac6a06d33ff4307510b80939802ac9b186253e7f
SHA256dccbe985a5cee94683168accc5cd5b91e84112c20d3aa85f543dd949cd76295c
SHA5124e926b4f3cdf6d3a47caf3984cbe97d25db0d29b652706ea951e8199eda534702afb5b4c0fe83c5c50ed2de74e5635eb1413739517e5c73d066b7ed2cd3be5dc
-
Filesize
64KB
MD5c7653a1a799af28dfc1c13a7d39b4ac5
SHA10befaf0e9f03ce2b7e65ed1030753ee5cb8a3fee
SHA256e8e9457b8230c46341f67402fb21b5842d21278c1a7b429566453c4166f63172
SHA512effbac63e939555f5f7adba9a53424b1c5cfed465456f4c9018e645be79c95bb6e81feb2b42dec14311fcd289b0034cfd493e4f597012956f7f37d0dcb827b0a