Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 13:09
Behavioral task
behavioral1
Sample
aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe
Resource
win7-20240903-en
General
-
Target
aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe
-
Size
90KB
-
MD5
938312316541b2ea8df97ead25238756
-
SHA1
3c521109cb6909591eb61cced5ccc1ffd2dcf923
-
SHA256
aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4
-
SHA512
efb1179aca0f3f1e350e9e6a117297e7d24b41dc62fa16019926e0f27ab760f528f8bd71e121257f0d922368f6b1cab0029ce43e9a289a92bbb56eb6b1377d36
-
SSDEEP
768:yMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:ybIvYvZEyFKF6N4aS5AQmZTl/5G
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3636 omsecor.exe 1560 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 220 wrote to memory of 3636 220 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 84 PID 220 wrote to memory of 3636 220 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 84 PID 220 wrote to memory of 3636 220 aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe 84 PID 3636 wrote to memory of 1560 3636 omsecor.exe 101 PID 3636 wrote to memory of 1560 3636 omsecor.exe 101 PID 3636 wrote to memory of 1560 3636 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe"C:\Users\Admin\AppData\Local\Temp\aa785ad971e52046093566ccdf1c349021ce7077aa1f5780eb78fd1fc3cb44c4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD58d690621cd20aa5428505dd0bd5a107c
SHA19088335cb566eb1d936fd2386dc0201cad66e93c
SHA2564933758db4701b2e9019d26f7459ed84748b2b57b8d3b5460a7b4c497eca6126
SHA5121bc4d9f6a4324aca728a0a06ab01dafddb2ba89f7b069fa2deec948f1c9eb9f6baa5244c273e204cf3f7b5b01c036872357368aa015ab6de9724b9e88b3e0cd2
-
Filesize
90KB
MD5f34e34d9b95179f08288e7ad8c4eb798
SHA16b03e0fadb6e5779e4b4da59dbeb4da5bf4e0235
SHA256ca347df041187178cb8f1dc9cd3f80b57fd780a7a8302b4ec54f8cbd8e869ef6
SHA512450d2852a291bd3242f589e32c28fbbb4ebee5e9c1353b5fc43f59bdd39175e538d5cd723685aa251d779f7252419a93b10bf53703e98f4ed6e791300e61548e