Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/02/2025, 20:40
Behavioral task
behavioral1
Sample
18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe
Resource
win7-20240903-en
General
-
Target
18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe
-
Size
80KB
-
MD5
74d1bab26ffb89f754807e40798a6736
-
SHA1
02935a3921f1a6df1db84287039cb276b8484b25
-
SHA256
18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8
-
SHA512
b7ea77639895043898e636c64134aa8905a7a8e57a4ec1f33e74f903400aab9af852e693c591cf4c06e528cb2f73671612eb644e1ddf4e4909460a8c0fd1748a
-
SSDEEP
1536:Qd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:QdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2008 omsecor.exe 2292 omsecor.exe 1180 omsecor.exe -
Loads dropped DLL 6 IoCs
pid Process 2504 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe 2504 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe 2008 omsecor.exe 2008 omsecor.exe 2292 omsecor.exe 2292 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2008 2504 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe 30 PID 2504 wrote to memory of 2008 2504 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe 30 PID 2504 wrote to memory of 2008 2504 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe 30 PID 2504 wrote to memory of 2008 2504 18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe 30 PID 2008 wrote to memory of 2292 2008 omsecor.exe 33 PID 2008 wrote to memory of 2292 2008 omsecor.exe 33 PID 2008 wrote to memory of 2292 2008 omsecor.exe 33 PID 2008 wrote to memory of 2292 2008 omsecor.exe 33 PID 2292 wrote to memory of 1180 2292 omsecor.exe 34 PID 2292 wrote to memory of 1180 2292 omsecor.exe 34 PID 2292 wrote to memory of 1180 2292 omsecor.exe 34 PID 2292 wrote to memory of 1180 2292 omsecor.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe"C:\Users\Admin\AppData\Local\Temp\18d26e9639de971412568c7e4334220161404d289169ef51a9edbda7828e4ac8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5524586543a4152a9da786a662d7a9af7
SHA19d47400e3b57465a7fbd4f83b15d01b41e28c339
SHA2566046a1f9d8aa71b8dbc6fff0a026b259acc5d3e74ffb6824fe50d3f814eaf895
SHA512a2df81929f5274828dfe53a7ba612a33f87d1a4d9d856191800e962cac36288c8d67534ab86023478f00354023f36f2d384c71d4088a0427af1e7c50ed62d37c
-
Filesize
80KB
MD5dc3935f88da507faf8d2a4d4fca10c80
SHA1a53e6ba06be539e06338a7836042f07443400199
SHA25662f51623ee3010e38a2e813c68e2a15c4dc210ac19fc5ecb02736fdadd09ffe8
SHA51206935069bb3a497b5473db774817369bc47066c50a8c1d8276c11a7daf64b262c410505b6b9bea484943663c01b11bdef191bdda059d6b4c11281be44d63e372
-
Filesize
80KB
MD564579266c5277b47fca3aa001eb101f8
SHA1218d0411b307f8552f60fcd17ec6d12166d1ce5b
SHA2565a17d5d991895bafc469c6359c4cf901a2694d9367e3fec66f3f35fa05a4c019
SHA512bf540722385fbe38aacf048db1f2acd6c1557ad4b08b7d311bc8664f50a865c71c1c75414e1bde0d62529a53d1c8c33f119dee7117a697281288aecc81b37cd6