Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:16
Behavioral task
behavioral1
Sample
2af4a3013dc8e3847bab66ddf8027d30N.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
120 seconds
General
-
Target
2af4a3013dc8e3847bab66ddf8027d30N.exe
-
Size
316KB
-
MD5
2af4a3013dc8e3847bab66ddf8027d30
-
SHA1
b4c5bef456672d7791919066b19af5ae59b684ef
-
SHA256
62cb5172156ebb279b2f49e655dfaf9233a7ae2ad59f5e95f6b53e294e08e4e0
-
SHA512
643dfaf5229b3323f8098b9f0c19c00c0f38fa3d7a83b0155718917e4d414489082e0f7d8856c5a4ce5133c1c9eb1f95bc726cecea5946c58550785a8ab0500e
-
SSDEEP
1536:p4d9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZUnOHBRzU:pIdseIO+EZEyFjEOFqTiQmKnOHjzU
Malware Config
Extracted
Family
neconyd
C2
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
resource yara_rule behavioral1/memory/2488-1-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2372 2488 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2af4a3013dc8e3847bab66ddf8027d30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2372 2488 2af4a3013dc8e3847bab66ddf8027d30N.exe 30 PID 2488 wrote to memory of 2372 2488 2af4a3013dc8e3847bab66ddf8027d30N.exe 30 PID 2488 wrote to memory of 2372 2488 2af4a3013dc8e3847bab66ddf8027d30N.exe 30 PID 2488 wrote to memory of 2372 2488 2af4a3013dc8e3847bab66ddf8027d30N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2af4a3013dc8e3847bab66ddf8027d30N.exe"C:\Users\Admin\AppData\Local\Temp\2af4a3013dc8e3847bab66ddf8027d30N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 362⤵
- Program crash
PID:2372
-