Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 21:15
Behavioral task
behavioral1
Sample
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe
Resource
win7-20240903-en
General
-
Target
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe
-
Size
76KB
-
MD5
1d5068159e726464c241156656cdb657
-
SHA1
091f1d503d1b064e894690bd97c24102ac9a8737
-
SHA256
2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783
-
SHA512
515c222061d450fd686c384efeebe55ad7bf44c4ef73789d6262e7f0bbd2547ab8ec63f4991bae687f47c57059d76f579ca365518d624a0ea52f889644bc39a6
-
SSDEEP
1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:XdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1972 omsecor.exe 532 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 908 wrote to memory of 1972 908 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 83 PID 908 wrote to memory of 1972 908 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 83 PID 908 wrote to memory of 1972 908 2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe 83 PID 1972 wrote to memory of 532 1972 omsecor.exe 100 PID 1972 wrote to memory of 532 1972 omsecor.exe 100 PID 1972 wrote to memory of 532 1972 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe"C:\Users\Admin\AppData\Local\Temp\2e9b14d4d97e5f74f719173fc78bdb7b3fd2672a6c7752b9578b8c5c8501d783.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:532
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD566a2c31b3916d7cec1c2deb50342d249
SHA12a47d17e240c08541ed88934be5ad7a1110c00da
SHA25676aec3689d9f98a213b5eccc20c68ccc4453ae045dec3d52d3ff172684cd7a3e
SHA51289824cd571c455f1fc94a91e12d6b726fb70b45bfbf669e1ccf9818fde1dce041d0ca75a5e5ab144620a65ff51bd1e22c7ee4b61bec88f2d71a2bf1c659580f7
-
Filesize
76KB
MD5e8ed50cb2882425567cab7645bb37b0e
SHA11fea5e0b7324e49646f6a249763b4d65e3f2f0b7
SHA2564f9ffee165111e0cdc63f437bff9124fc9c64809d425d1a4ad1ee36cc788605f
SHA512e642fb62be23e132d9e85cfb85d60999711ac14a9ee6628ce979a1689c55cf3ef3a47c8ae930c82559b5cbd2516ce74d1b693b6e26d2f0c40ce6cf55e6e4b856