Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/11/2024, 13:59
Behavioral task
behavioral1
Sample
3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe
Resource
win7-20241010-en
General
-
Target
3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe
-
Size
90KB
-
MD5
7596de0a78134f47afbb252e8de31240
-
SHA1
18de0d3f4a4873a1c7473458bc1f8c9cc76ec844
-
SHA256
3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70
-
SHA512
c0af3672c3e645764b03743dbeae561f0211445378d396a714150e16518f2e9f1123ca0abc67cfdf8d8046531d68c2937a1abe53016523bf79cc6a2fd068ec44
-
SSDEEP
768:OMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:ObIvYvZEyFKF6N4aS5AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4240 omsecor.exe 1496 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4240 4624 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 82 PID 4624 wrote to memory of 4240 4624 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 82 PID 4624 wrote to memory of 4240 4624 3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe 82 PID 4240 wrote to memory of 1496 4240 omsecor.exe 92 PID 4240 wrote to memory of 1496 4240 omsecor.exe 92 PID 4240 wrote to memory of 1496 4240 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe"C:\Users\Admin\AppData\Local\Temp\3ed1fd569093306b11d04d457a72ba351e7713a0913e84717170526f64c0ac70N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD569d79a779068b41b77dc8ea4b49ad27f
SHA159ec448d768d400a70185e364decf95df233acd5
SHA256e931a9c1646b0058d11681456eddd4d2373a24ef7b772a4b7a02b8af7d4b7808
SHA51283496f4bd9bdbae3d7ff68a9b0e2897d589ebbac86797dd45202bdeaf72eb4b04c36d033b0d801e6d4d7dac871f62e9268c30345133d867e0c1ec60ed3179c56
-
Filesize
90KB
MD5503dc8590d480fffdea58c0daa73eec1
SHA1ffe6bdc51fe1bb738e260cb62e79edd9c61ba449
SHA256a8c5b78a23afd3bbff4a3a550485a5fad0551be847d2bc4d0d2e1e4f03b1939a
SHA512dca0f9336f5f0cb6e29d68ccf3b64b25334dcbd05a7943c1c93a4ca5a3a56a34285975c350ff3ece5ceaeee6463d5ab1a949245c8fe92de0d8afa6830f525840