Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/11/2024, 14:21
Behavioral task
behavioral1
Sample
bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe
Resource
win7-20240903-en
General
-
Target
bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe
-
Size
88KB
-
MD5
1f123d1bb837605fc66f5c41e513fef0
-
SHA1
3d745d2e5ac0949e3b14bc9106149e65715ea3f6
-
SHA256
bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dc
-
SHA512
a65677d262465aca8c23cc240f0505e3ae11237d4729562e275487a3cfa71a4da6e0efc82c5739e44e4e4e3b3a32b3543321cb45959ed898ae148d8f49678b83
-
SSDEEP
768:ZMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:ZbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3028 omsecor.exe 4060 omsecor.exe 3900 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2616 wrote to memory of 3028 2616 bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe 83 PID 2616 wrote to memory of 3028 2616 bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe 83 PID 2616 wrote to memory of 3028 2616 bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe 83 PID 3028 wrote to memory of 4060 3028 omsecor.exe 100 PID 3028 wrote to memory of 4060 3028 omsecor.exe 100 PID 3028 wrote to memory of 4060 3028 omsecor.exe 100 PID 4060 wrote to memory of 3900 4060 omsecor.exe 101 PID 4060 wrote to memory of 3900 4060 omsecor.exe 101 PID 4060 wrote to memory of 3900 4060 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe"C:\Users\Admin\AppData\Local\Temp\bcfe46db3d0db34dad4bf619018b069893491567152b4fa3b6541f9f05c9c3dcN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD59bd5650aae2cba0b96742ff381347f5f
SHA1f1bd1fb3171c4a39d9b1cfcb172ccfe2e2d8e110
SHA2565a872257e526c2358381273722b80b397d97b7d94e3331bc89ed716a8a3911a2
SHA512b7f75b908f55375bfb2b6d9d84e89ea84f3612d132905b8a5199030a1d6beea26d1969ba49f870b66e9d9a46f6ba27cc8cbb91883c74bdaa497bab04ff13e26f
-
Filesize
88KB
MD595a7149c0f3e10ea0a2be3f3ff0faeff
SHA169e06d90987d62866e33c10fb09cf0f9850271d5
SHA256c63b538af7d4e72f18b942ec2108108d2c3c4c878042673ac0a9d0aef082a0c2
SHA512669a30b38c7291f915a607f8051f6b1a3c1d76301b243b7516998bc11444fc49d6cb82b7428c121053dd00dabeb2c5d556e26b3f82fd6d18863e6c306a6e2bff
-
Filesize
88KB
MD53f028adb4874dd1dd71837f3f426e42b
SHA1413477afd98221d662a300a7d0360f1641cf2155
SHA256c10e70a36cddce5602fff36ffa57fc28d45842a826cd7e5b4d50e1d38b4eb921
SHA512c6be3a98cf48293ad06ea1aa8587ddd6fd558a942eba3f08de26e20da0eec2826a10a82920e598b0632d80e9c9f36f6be9625a3b8a9c210bd0aac04ab721f7a1