Analysis
-
max time kernel
114s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 20:33
Behavioral task
behavioral1
Sample
470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe
Resource
win7-20240729-en
General
-
Target
470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe
-
Size
71KB
-
MD5
cc57cf9a8fcce284133dc40eacd710c0
-
SHA1
a44cc04e818777e245724a71d1502e92edc39a72
-
SHA256
470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006a
-
SHA512
789269323fd940b3b980fcce475dbd6bf62c704133c5222b53975bafb09af4b5b43cddf6444e9d47394f7c5582e44116f18cabd1e1e7217effe7163ef3639032
-
SSDEEP
1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:3dseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4020 omsecor.exe 3908 omsecor.exe 4080 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4496 wrote to memory of 4020 4496 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 83 PID 4496 wrote to memory of 4020 4496 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 83 PID 4496 wrote to memory of 4020 4496 470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe 83 PID 4020 wrote to memory of 3908 4020 omsecor.exe 101 PID 4020 wrote to memory of 3908 4020 omsecor.exe 101 PID 4020 wrote to memory of 3908 4020 omsecor.exe 101 PID 3908 wrote to memory of 4080 3908 omsecor.exe 102 PID 3908 wrote to memory of 4080 3908 omsecor.exe 102 PID 3908 wrote to memory of 4080 3908 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe"C:\Users\Admin\AppData\Local\Temp\470a5d0420827c75b3fe07a3789e96f3da677c86adc14ab4d01129f41561006aN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5251c6c1fb092d7be075b6aefab19b80d
SHA12a43a826ec3adcb2a5359b50d3827747a04351fc
SHA2566e3a7cdc6143032411bb0de65f0b0a582c250a587d3f8138e3d21f546057b2f1
SHA512271ef93f6f1a5fdac445097b183c4d3c993770c55f5bbb6a4443b294ca9b684469e4e2c58d91b2dccbc639591837325a77e0f83884bd7e8cea0e355d83d713bb
-
Filesize
71KB
MD5f627e48f8af241dca7a9e896aeda1e70
SHA1bcb952b35f11c90c3969b83e32e4a2cd931d311c
SHA256734a15bd9beb9b3a954d473d6d84f69c50c7004397a1f56242a664fefdd2e043
SHA512ec5fe971c0565aa795025554464a430bb3b2c571e533006b7636cd5b4524920ffbb428e5d95e7787cbc59056fbfb314316d0774a6b0a49c90c45c39c296d5270
-
Filesize
71KB
MD5b6b22e5d473d0cfe4311709fe8b28085
SHA101b477c4582712241e14569b72d6ee2c420a8a1c
SHA2569a1604c398e5d8860f9a455746cfdc847e50ded0fc2399cd17578f531f147ede
SHA5127fb09240ddf2676d5418e62528bd6d39d186759b2afd45f81fe48ee9dc41e28ef79a3c437989de385dc9dc58856e800df47c62e0805f51b57a0e3fe444af1529