Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 19:48
Behavioral task
behavioral1
Sample
3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe
Resource
win7-20240903-en
General
-
Target
3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe
-
Size
35KB
-
MD5
2ccd7f467f599c1b3415318e83551eb0
-
SHA1
3431c0360c57f0d4d35d847394821663e5e72b65
-
SHA256
3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405
-
SHA512
13b780d7615730984e5143be42c33d14905c9681a75a57741b78d08c03c37d8b6e17e6ecb9f8073bc9b3544286b4a6517fbfc59e67d1a91f69f6a2e2bc8edddc
-
SSDEEP
768:J6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB:k8Z0kA7FHlO2OwOTUtKjpB
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3268 omsecor.exe 4036 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
resource yara_rule behavioral2/memory/4808-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000c000000023b7a-3.dat upx behavioral2/memory/3268-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4808-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3268-8-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3268-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3268-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3268-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000200000001e733-18.dat upx behavioral2/memory/4036-19-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3268-22-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/4036-23-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3268 4808 3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe 82 PID 4808 wrote to memory of 3268 4808 3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe 82 PID 4808 wrote to memory of 3268 4808 3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe 82 PID 3268 wrote to memory of 4036 3268 omsecor.exe 92 PID 3268 wrote to memory of 4036 3268 omsecor.exe 92 PID 3268 wrote to memory of 4036 3268 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe"C:\Users\Admin\AppData\Local\Temp\3afc9296a56ce2b0b43a2e4ec84c3ac37f3e59223ff5ede733462610b6f11405N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD528dcbb10946888a35e09005f71096727
SHA108db71ce1dfaad641cfb3378df2baaf5192ae916
SHA2565506fe4418331495d39eae2705f0a06710348b7de6ac8170bf34acb03b8a45bf
SHA512f125ba1f1f2aff2fdd3cc72e057b7f2a3a938e6f809e686542946bf1a84b725c16da5c4d66ef890ff5b4c4a5a9b4ea3e50cf8a4d51a8d870a01b837d3d80d413
-
Filesize
35KB
MD5eeacf6ffffd643c32c218d06f6878db4
SHA173dd79849894a65fc9f7da1f5b6501a89ca8f9f5
SHA256be6a0b8bb8ed93c74af3299c7b2816a1ece6f4c1085454a6503bc360dcb1d680
SHA5127a97dc7d113408701ed19dd851156b0691d3dd1af4bb09563a4146cb13e4cd22ce2b70d660eeaf3b6534b93af472bbb0760cf046335998fc6949f575fc952cd5