Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe
Resource
win7-20241023-en
General
-
Target
e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe
-
Size
33KB
-
MD5
d7c40a64b0459499352df149608e092a
-
SHA1
da4fbf544f318a73fd942f181786273ded2f21c8
-
SHA256
e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7
-
SHA512
0747c603a2452753eacff673bb236865dfad713a341b94b7de8a1694f5d38621def56745588d5dfdb9e835b48b789d0c1e140702b698b8f0d4f41f380776e938
-
SSDEEP
768:0fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:0fVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2992 omsecor.exe 1232 omsecor.exe 2884 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1840 wrote to memory of 2992 1840 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 83 PID 1840 wrote to memory of 2992 1840 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 83 PID 1840 wrote to memory of 2992 1840 e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe 83 PID 2992 wrote to memory of 1232 2992 omsecor.exe 101 PID 2992 wrote to memory of 1232 2992 omsecor.exe 101 PID 2992 wrote to memory of 1232 2992 omsecor.exe 101 PID 1232 wrote to memory of 2884 1232 omsecor.exe 102 PID 1232 wrote to memory of 2884 1232 omsecor.exe 102 PID 1232 wrote to memory of 2884 1232 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe"C:\Users\Admin\AppData\Local\Temp\e037e4d455f855242d557ca4c8447ffd20cb163174e661fb09b67a63f73b08c7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5d027890a9809ac1b2b02e4bdf70f1a5e
SHA1f9d4d618e911d33d40388e085ce435dfee497880
SHA256113b1ba7a1b133fc325ff38308561774c2bee2805798d45b62c17ed65cd15084
SHA5124c85800564c74daefdef07370653bf03167ef971c98ae8f4d0b3ac4a988364df47ca464c498836c22c76cdecc96ff9f4d774c55d7b4a47c9ab779ff61121d70c
-
Filesize
33KB
MD55c4e31065a9199a78ede6553d5f7c7e5
SHA19544d2b5d8ccad2a2719b8ac72469d9ba38c3c03
SHA256a18dbc2c05e49fc0a61232a045416b29ec59f3856b553253302f2426670b38f1
SHA51232535e31e81914ebdad1dfa0244b14dce83de06be1470242b272f634e0df1886bea17aeb2c9b3963480b7db0a11a4809200048c3e052c93312cf6e4a7692f25f
-
Filesize
33KB
MD5bf321930805bc928cf7c16478188b37a
SHA133d50490f6b29a64393b38dca5857102eaf8e706
SHA256c5e34b667c7364159e1773526be72609350650db2e81afec847c1107b5cbdcdc
SHA512252195c2439c96bda21c80eb94dbb10f692134e4e195acba23437acd733b149ff3fe391c80f63762f56512c4cd9d515c275e5a84981711a4f2c7b1778c6787a0