Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 00:05
Behavioral task
behavioral1
Sample
74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe
Resource
win7-20241010-en
General
-
Target
74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe
-
Size
88KB
-
MD5
14c8829e10b2cc00a771adaef1f721b9
-
SHA1
d1a5ca499844c45c49a4e253523029fb1e8fc91c
-
SHA256
74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c
-
SHA512
4c588b566c9fbe21e54b556427d68de67a74c8810631c4f4aad1a259dc9f557c83f9547fb927658f5396bdebce325fdb38e3af5394ac33e44014da37a252f509
-
SSDEEP
768:gMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:gbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1468 omsecor.exe 2948 omsecor.exe 4600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4028 wrote to memory of 1468 4028 74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe 82 PID 4028 wrote to memory of 1468 4028 74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe 82 PID 4028 wrote to memory of 1468 4028 74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe 82 PID 1468 wrote to memory of 2948 1468 omsecor.exe 92 PID 1468 wrote to memory of 2948 1468 omsecor.exe 92 PID 1468 wrote to memory of 2948 1468 omsecor.exe 92 PID 2948 wrote to memory of 4600 2948 omsecor.exe 93 PID 2948 wrote to memory of 4600 2948 omsecor.exe 93 PID 2948 wrote to memory of 4600 2948 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe"C:\Users\Admin\AppData\Local\Temp\74f8aa53944d2070e3923af31fefbe49160b1f978be2528abb476dc28b0d1b0c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD54ca40ea30d1a91a2bd3c64c006e6a2cc
SHA1dd4c38d763eb5224547fde386fe5de1d390d6fb4
SHA256d4eb2be62113ef15a7b861f16ed480a097c4d1fc1c1b8a75420f1b146a09bbdf
SHA512017726f5e56d9844bff88137434a7cf27942acb4d5e86cb3a957c7d0bc683dc4ab1405b86b78a852068d5fb2919f03867a92211b372166d196559d2342f6a264
-
Filesize
88KB
MD566004004f0d6b0e0a74e6549f9c33001
SHA191ba15e244aa359876a0f7ec1ba453803cf2742b
SHA2564aa68ab79d7d8bfd1a4bdfff0d6e3acdca7d6ae8b25406df7340ee61f39188ea
SHA5121bcbb59f458328a3e427c2575526317a17d9175a228edbd6950844c2c5e7a5eff9a21cd41662f3f13adb9b0ae32420825221ac6a2f7e2bf9fce38dca233bd23d
-
Filesize
88KB
MD5b6c3068d394867676711394f5919f437
SHA12d3280eb338cb22efb55500dced5cb2178839b6d
SHA256851e0cde6a8403543553b0a111d675b40422284f71bc12067b92593facf89892
SHA5127e648938433abf13a8ed2b20b849dc77ccd08fc29556cb3fbb2348bb723756a2fd3f2c4bc6855c98d8bbe7e0e05406c248dbe37ac13f416ebdb1981f3e3947a8