Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 01:03
Behavioral task
behavioral1
Sample
41f8d75e8978ed377acc0f3024a64a70_NEAS.exe
Resource
win7-20240221-en
General
-
Target
41f8d75e8978ed377acc0f3024a64a70_NEAS.exe
-
Size
88KB
-
MD5
41f8d75e8978ed377acc0f3024a64a70
-
SHA1
fc0a433aa5e13b050ae39b18cf5c59bfd61818d9
-
SHA256
b87a21e5ac07a9b9863ee2d9e265340bef3937e3a30a92ec74c8db618d4f50af
-
SHA512
3cfcfab11e7accebb66dea3c2f4117e5fa5879b10682f4769d411b101fae24ba2e39f1896a0ac3cdabcc25a529d3bd5f966ff11bc3e87a5e6537ed600d609c14
-
SSDEEP
768:bMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:bbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1464 omsecor.exe 1008 omsecor.exe 4592 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 532 wrote to memory of 1464 532 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 83 PID 532 wrote to memory of 1464 532 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 83 PID 532 wrote to memory of 1464 532 41f8d75e8978ed377acc0f3024a64a70_NEAS.exe 83 PID 1464 wrote to memory of 1008 1464 omsecor.exe 104 PID 1464 wrote to memory of 1008 1464 omsecor.exe 104 PID 1464 wrote to memory of 1008 1464 omsecor.exe 104 PID 1008 wrote to memory of 4592 1008 omsecor.exe 105 PID 1008 wrote to memory of 4592 1008 omsecor.exe 105 PID 1008 wrote to memory of 4592 1008 omsecor.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\41f8d75e8978ed377acc0f3024a64a70_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\41f8d75e8978ed377acc0f3024a64a70_NEAS.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
PID:4592
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD523aa020a09d1eca6fb447c24180f0393
SHA179f6ccd7da37013a60df1d035f76a7c4d45387dc
SHA256f1ca080330658d854c77440d78af2997044a8137e395ab8e60db869601373cf2
SHA5124679487492f5618519cef482daea6b50fef5a54cb7a73b915407351b2d6e6f8efc7ea26a00da8767f70462aff1f04e2b12ad7cee381aa6c95cd837675adf9c18
-
Filesize
88KB
MD53cf5d917a060684a9efff3074b149e97
SHA145fcfff1a3c4433d4f4fb4e51ae0fe25228066ec
SHA2563de32c2e9033517203ad77ef7fd349322ad359972f4a11d2eac581bab5fca96f
SHA5127cb1793a877f01a5516738412744aecc37c1acf8623d07e7d7939c5658d347be21c02a308469ff733cbdcb07f0653e085094333c35db74b0f12c852c22b503fb
-
Filesize
88KB
MD5ac8f9329110f8d1e564572b281ef893a
SHA12ef3f7287678a0f27fed89e6c9c6b7c5f0887b0f
SHA256582c96823f03e314eae0611a052af803f3f5d60f8192680d388ef5162a4e163a
SHA5122debd93e583c18916808570b0963b961bfc1c0b12055c8b4e096ec23618ebfab791b60de71ad415f9f304fdaa4498e70f0ba7d1a071e06c7f70e5a8573e7ba6d