Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:18
Behavioral task
behavioral1
Sample
30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe
Resource
win7-20240903-en
General
-
Target
30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe
-
Size
80KB
-
MD5
7029ae0bc40f5db9c20b8253ac405240
-
SHA1
2d399015472e8ad47044781c979edaef599e5047
-
SHA256
30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1
-
SHA512
4c7f97e3c32dd1323e8adcc12b521b9c489003324cea7577b52ff771a793cf1fd8fc0e86707e18199b55c67dc32951d24b36323564576178242fbf012954eef8
-
SSDEEP
1536:Cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:ydseIOMEZEyFjEOFqTiQmOl/5xPvwX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4836 omsecor.exe 3808 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4836 4780 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 83 PID 4780 wrote to memory of 4836 4780 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 83 PID 4780 wrote to memory of 4836 4780 30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe 83 PID 4836 wrote to memory of 3808 4836 omsecor.exe 105 PID 4836 wrote to memory of 3808 4836 omsecor.exe 105 PID 4836 wrote to memory of 3808 4836 omsecor.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe"C:\Users\Admin\AppData\Local\Temp\30219542000d88d27b93554c11a01fdd7a2ade148a916f32813500d31df3f0b1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5b01cfe68b63834ebb86c70bdffca334f
SHA19c4d05d71a2fdcfbe2144c4e61fa456019c54d85
SHA2567805e31a0b5361fef9276753c2480e5f96d1925585bb36b37ad3f12a39bd7c4d
SHA51203cd171dd0d8395dd7188307b934b9661c0cc33632a89021ec2758da86fff68729514429b7e8ce6a07af981756914900e3cb5e29aad805e45b14b1caed847738
-
Filesize
80KB
MD557fcecf952f292b031fc8355ecf81c78
SHA16fcd150ffedb2ed93dbd9f3c7c61113b86bb13fd
SHA256f62cfd3d201f828ba1f5415435fe57293828d42cad16d3420f391d2d86a00e2f
SHA512850cd4cf425b07b465fe77cbbd0ebf0d56247a448161263cadc0520bf17ff1a9a935f56a2e47f781d27e879d3a515d9cc4e55ca38a415b5c6b26092ad75e35e2