Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2024, 09:07
Behavioral task
behavioral1
Sample
7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe
Resource
win7-20241010-en
General
-
Target
7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe
-
Size
88KB
-
MD5
f09c5befab2a46f95cdaf3621e20a5fa
-
SHA1
12a837441fea6d04e24d3609ed906167bb0b37eb
-
SHA256
7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24
-
SHA512
f96d9065f4c98f52ce6d31261498ad2b3c1da84fa05d66510e3002f7605387fc8319e2a5c6068e8fa8bfe76c4d6cedfc6906f465d0247ed1d07bf536c18b3a46
-
SSDEEP
768:ZMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAa:ZbIvYvZEyFKF6N4yS+AQmZTl/5C
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 116 omsecor.exe 4836 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2836 wrote to memory of 116 2836 7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe 82 PID 2836 wrote to memory of 116 2836 7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe 82 PID 2836 wrote to memory of 116 2836 7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe 82 PID 116 wrote to memory of 4836 116 omsecor.exe 92 PID 116 wrote to memory of 4836 116 omsecor.exe 92 PID 116 wrote to memory of 4836 116 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe"C:\Users\Admin\AppData\Local\Temp\7174c661fe2966bf811598b960e4118bd8b0f4264e9b20aeaacb7a8111188f24.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD58ca3ff1f4406904060453bc4b005212c
SHA1d5a441b85ece1414968bee90d7f12a8403f62393
SHA256819a452368dae2cb1f506f33a34fa2d3bf6942b1146258f72ebd641a69bb7b4f
SHA51206c0acf40b431811033b18cbfb8fcc00fc02315184999589d3ce015e4fdbfdc2841fbc203d432f833e865f5768dc77e9e6461d09fb44d6fdce6b5372c71fc4dd
-
Filesize
88KB
MD5c47126b9eb1231c0c49aa3033244facc
SHA1c6523b1ed470eb654d6843e408c2dcf47db2a910
SHA25632b2d8523e6bc3a5215f99b9350f116e3d0410b3059034b706ac2416e48ec6c1
SHA512f10fb873867ad7c01e2e9dbd1bf26fd6f730e27b04a8ec0af26aa24f4768a09ced27f0151b6904d21e5fa92b2a822091960bbf7e61e618ea3a5311d6e5f3d986