Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 20:22
Behavioral task
behavioral1
Sample
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
Resource
win7-20240903-en
General
-
Target
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe
-
Size
80KB
-
MD5
96118f09644ca13af64fe49b35b0e320
-
SHA1
eed96488981cf3dff1697b845a8a0ff6ea6b0c08
-
SHA256
f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d
-
SHA512
5a8bf5d6bc2f621f42cde2bcea3b626b2501e913356b93c46a79019c633e0c59918708cfc85fe97abf7fd0f8a50cfe083a9975ae6d8a0a4cb994b5a2bf7f6e3d
-
SSDEEP
768:6fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAq:6fbIvYvZEyFKF6N4yS+AQmZTl/5y
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4568 omsecor.exe 760 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4196 wrote to memory of 4568 4196 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 82 PID 4196 wrote to memory of 4568 4196 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 82 PID 4196 wrote to memory of 4568 4196 f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe 82 PID 4568 wrote to memory of 760 4568 omsecor.exe 92 PID 4568 wrote to memory of 760 4568 omsecor.exe 92 PID 4568 wrote to memory of 760 4568 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"C:\Users\Admin\AppData\Local\Temp\f9700cc60bd68045468817edb0249d075ffe510fe19e21d5246229eaf9a74a3d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD59a311e2b1f74160cb44241e8f792e6f3
SHA1dadf8b3a09e0f1b81f5fb15760fd6d1adee9445d
SHA25677a3d2bbc0416b8a0735b2ac38178f44853ab6932a806b0576ad70355b5bec9f
SHA51226214968b2cb10f12c6d4a7dac5ae9af3956b1e06485067fa9c52b055b97ec1c65a12d140c45d4bc639b34427fa0945288d36ffb8d777073377d876feeb8d867
-
Filesize
80KB
MD571d5e6a0440ef7b480ab62aeb483abd2
SHA1607d82c384a05badf828f72b3ea19b445255e7c8
SHA2561f4c814fb6668ac7d52a5a0a18678ebfef7c1777194ac364ae0e952826e3259d
SHA512d239c9d2c5441a71b3bed4bf09fa7a1a2c395abb7c5bbd5c2eff51dbb1a0743b6d70a9e69b402c1a57b33e822d3ec7094b38437074de407a85183d4bbc49993e