Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 14:02
Behavioral task
behavioral1
Sample
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
Resource
win7-20241023-en
General
-
Target
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe
-
Size
64KB
-
MD5
83e03fbb59d718699eb7c7e3b056b11e
-
SHA1
0cb3032735883b2614e46afe3f83aa76baa55a86
-
SHA256
817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7
-
SHA512
1fa730fabfa6cfd367478f19cb6e56ad9abd8e613b3ccbdeb9d23266f6a5eaf5e33150b4bfe108e9f841d69f19607ba2fc37e400d387756baebc8bce32f3f4a5
-
SSDEEP
1536:Ed9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5c:8dseIOMEZEyFjEOFqTiQm5l/5c
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1164 omsecor.exe 1584 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1164 2784 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 82 PID 2784 wrote to memory of 1164 2784 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 82 PID 2784 wrote to memory of 1164 2784 817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe 82 PID 1164 wrote to memory of 1584 1164 omsecor.exe 92 PID 1164 wrote to memory of 1584 1164 omsecor.exe 92 PID 1164 wrote to memory of 1584 1164 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"C:\Users\Admin\AppData\Local\Temp\817ac9fe9e913ac5db821317ba03cab24e18a5e8970fc33d16ec0ff9078194b7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD56a38c82b3c933a213b2597aca2357389
SHA17cdad1d2bb17c077d0efd77911f86753590ba9e8
SHA256d23899b8bb88abba3e5be103dd87a81b08ae31806eef4b987fc0a40e40d39959
SHA5120a7b9903ec4bde04c4e777a36d5335d1a65e5e0d1741b7c80dee57f0f432e8e22e1c0fd4f75921d88683b7beb728434bf4d6da735de3726d412d64795f9b11ba
-
Filesize
64KB
MD5f50254bbd31b7a4d0383d12d85c06d83
SHA1910942aef15489ed987669abe6b51e8ed115dc48
SHA2562d348c73de7898a0bde5ed7bea6f2fd1f743fc8417da92b892a67e541f863621
SHA512b1c33b1d2b2f6edafe140f751dda0c4868a0385aa2464b611a20d7c16e90bdf763036bc8d40b7615c412ace715f3b0893c2f514ee7431be29de40acbf2e936b9