Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 13:58
Behavioral task
behavioral1
Sample
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
Resource
win7-20241023-en
General
-
Target
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
-
Size
64KB
-
MD5
83e03fbb59d718699eb7c7e3b056b11e
-
SHA1
0cb3032735883b2614e46afe3f83aa76baa55a86
-
SHA256
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7
-
SHA512
1fa730fabfa6cfd367478f19cb6e56ad9abd8e613b3ccbdeb9d23266f6a5eaf5e33150b4bfe108e9f841d69f19607ba2fc37e400d387756baebc8bce32f3f4a5
-
SSDEEP
1536:Ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5c:8dseIOMEZEyFjEOFqTiQm5l/5c
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 5104 omsecor.exe 3384 omsecor.exe 4892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1236 wrote to memory of 5104 1236 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 82 PID 1236 wrote to memory of 5104 1236 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 82 PID 1236 wrote to memory of 5104 1236 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 82 PID 5104 wrote to memory of 3384 5104 omsecor.exe 92 PID 5104 wrote to memory of 3384 5104 omsecor.exe 92 PID 5104 wrote to memory of 3384 5104 omsecor.exe 92 PID 3384 wrote to memory of 4892 3384 omsecor.exe 93 PID 3384 wrote to memory of 4892 3384 omsecor.exe 93 PID 3384 wrote to memory of 4892 3384 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52644f59309a52cb1a2c7be7860a08ac9
SHA1405c6b2ff8a474464dbd6c1e1d3631c1cfe9c11e
SHA25611e6df97f77ea4ef154616cb3538db984f9e1b60b4beedd2e9b0199f63665796
SHA5127b5aac0198564ce397ff491b1987f135b36bfe9eca79a1caceb79ec34987b73bc9191baca57fd877bff8698ebd6161797e65136387fb78a93cab69430b3ff688
-
Filesize
64KB
MD56a38c82b3c933a213b2597aca2357389
SHA17cdad1d2bb17c077d0efd77911f86753590ba9e8
SHA256d23899b8bb88abba3e5be103dd87a81b08ae31806eef4b987fc0a40e40d39959
SHA5120a7b9903ec4bde04c4e777a36d5335d1a65e5e0d1741b7c80dee57f0f432e8e22e1c0fd4f75921d88683b7beb728434bf4d6da735de3726d412d64795f9b11ba
-
Filesize
64KB
MD58f2e6d295d5f096ed6b32c22dd539023
SHA1e3cae91dfeee9ed8636636d4fc9828c414e0f848
SHA256aa9cf2d2cabe26320861b1422c37812e1b6d5f01edf5d4f6093ee408d1b419d4
SHA5128d2235182c8646f635c674d17cf2b14f34bc5aa6bf4acf702e964238d34e608728add0bbc68c0495bb29ae16246b249afcc470b01d6b741b677cea93b2793bca