Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 23:08
Behavioral task
behavioral1
Sample
613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe
Resource
win7-20240729-en
General
-
Target
613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe
-
Size
61KB
-
MD5
4cdd5c4035f93797a4a9f1ee147c5f42
-
SHA1
3db6630290a8dfe358ea842303a576c655f0606c
-
SHA256
613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559
-
SHA512
e73bd6095dcf0b395a4c4ccf6a679247ef80725d9f2e7257be85b2efc73f39a11be5eeba630417ca05bd0a001968f081c59ec17465959c9889c3269d9b14432b
-
SSDEEP
768:8MEIvFGvZEr8LFK0ic46N47eSdYAHwmZ7Bp6JXXlaa5uA:8bIvYvZEyFKF6N4yS+AQmZIl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2456 omsecor.exe 2940 omsecor.exe 4508 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4448 wrote to memory of 2456 4448 613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe 84 PID 4448 wrote to memory of 2456 4448 613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe 84 PID 4448 wrote to memory of 2456 4448 613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe 84 PID 2456 wrote to memory of 2940 2456 omsecor.exe 103 PID 2456 wrote to memory of 2940 2456 omsecor.exe 103 PID 2456 wrote to memory of 2940 2456 omsecor.exe 103 PID 2940 wrote to memory of 4508 2940 omsecor.exe 104 PID 2940 wrote to memory of 4508 2940 omsecor.exe 104 PID 2940 wrote to memory of 4508 2940 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe"C:\Users\Admin\AppData\Local\Temp\613c74090f22646927926bf3f0bf78391f6c1d5d8751d7ae2ba831b592f0a559.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5be086d79179545bf7592ff484fb44590
SHA1a3a4d6ca2e234f32776aabc80551f6732b0956c7
SHA2565df940d23b8eb9fdf1f833605133f28031a48c9c725395f9b98bfc1d6a17193c
SHA5122f7b3d9cff88117b3af9ccea8b173c011bf54dbf4fc6c9431d598de42d69bee4c8bf69f6bb8b20c260dfb3c54ecaa7b28c2a75ce15f22346e8aef202efc2e08c
-
Filesize
61KB
MD5487f765aae2a9d9d3bc583e608c27a10
SHA1b39235fefdbe3a341e0c13e46928e2fdd9022a01
SHA256376e2a6a8b394a77d9759700c947ba5ed08d9afc1841cfd25ae0a3a38b5ccae7
SHA51241e4ab9da03d87ad324ce56d18a1aaa02f1f0121d865065beb880a45a0c30572c94c19f9616d7395a0088310d859f5592a04809310ef6fee4e8f36401e3ad601
-
Filesize
61KB
MD5fbc0accdda4450766f5a619333504296
SHA11832a255eebc6fe8d7f93e45a37780e2ee1f17c1
SHA2566ab1934d59d1cab5f0d91619a05e2d7a82ef0a6340df971956384443c12ed359
SHA5120c54b819b084c44279e603235d7574f992802fd6381383b84878921f95512b821f30b9c56300b77db928bd6a53f2c597c87fbc23bac94223cdac1ecbf9e33dfb