Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 22:48
Behavioral task
behavioral1
Sample
54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe
Resource
win7-20241010-en
General
-
Target
54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe
-
Size
61KB
-
MD5
542eabe402e27707273b8f793764a2f0
-
SHA1
b371e4b14851339d9d392ecc9378fac85f38edf0
-
SHA256
54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9
-
SHA512
473a569a43c9b09a16e6df2765bad6b3679782ff7e4f6f365130074c73f26f933113395aacefb7622619613623707d2fad72adc2d085fe30a102333cfe2bc56d
-
SSDEEP
1536:5d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5:ZdseIOMEZEyFjEOFqTiQmFql/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4780 omsecor.exe 4432 omsecor.exe 1284 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 432 wrote to memory of 4780 432 54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe 82 PID 432 wrote to memory of 4780 432 54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe 82 PID 432 wrote to memory of 4780 432 54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe 82 PID 4780 wrote to memory of 4432 4780 omsecor.exe 92 PID 4780 wrote to memory of 4432 4780 omsecor.exe 92 PID 4780 wrote to memory of 4432 4780 omsecor.exe 92 PID 4432 wrote to memory of 1284 4432 omsecor.exe 93 PID 4432 wrote to memory of 1284 4432 omsecor.exe 93 PID 4432 wrote to memory of 1284 4432 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe"C:\Users\Admin\AppData\Local\Temp\54c6fd08ee54b9af62d89c572818604ba420de37a8ee9892d5c3d3ca12efe4e9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD57cf47b16991d4d98940bf855a4e63b44
SHA168e5ff81b8d8695748ea6a2dcb0890d6234f0e66
SHA2564f7adca36d1b484eb33835c5113266e1c355e0102686006f40a52f9e1134ff00
SHA512b25842abda7b70680e9ed8be3642c66a3c6b48b597e1e6851b3744a76c9aabe5e445226c436402e03b7b65fa96fffae73d23ef9b533958be148540bc439031e2
-
Filesize
61KB
MD591df5b2aeb8a792abaedcc023a9e4aa6
SHA18e21dae3b69bcb388f55b66f924af7579ed6afcb
SHA256654b39a0391b5758bd7c0fb0b514f0ed036567f7aebb07ccc95e09716416f18d
SHA51255abf812aecb4c0a3ef993cd98d51baec0f4229c76672a946de5e84106533f40f3fb0bf813e71cb6f623f38f4a4f9e1e5d64853d2b4dbd30fbec6f3b6ff47d26
-
Filesize
61KB
MD5a5d295b963f42ce8af77606de82546e8
SHA1565fcea78c9d3b873cfd45826b81f89d24bf55d0
SHA256921a8b42d5c2c22825add23a4d7af3055cf65da50e22a95d88475d602fd0412b
SHA512424749a4ec1f897daac446ea1a5a0033433591beb7a4ff531fc8898195c85f0974670db42aa80d975aa8cb04e1d90ce7ffea5ee800e1da5b9c9f08f2b378ec6b