Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 00:19
Behavioral task
behavioral1
Sample
bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe
Resource
win7-20240903-en
General
-
Target
bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe
-
Size
62KB
-
MD5
b8d81c6c19f8790104089e0387dcf070
-
SHA1
baacf52d869f94b73e2d10b75f1650b458207b8a
-
SHA256
bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022
-
SHA512
08b11bb8ec067b01751c3e294423b152758b82f8b8c8bfa7190492c91e775532c98cea369d351138a1cc9b8cd808a2bcf3651df5c6d724ecf322be47ceffe67a
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uA:NbIvYvZEyFKF6N4yS+AQmZtl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1396 omsecor.exe 1608 omsecor.exe 3096 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2796 wrote to memory of 1396 2796 bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe 83 PID 2796 wrote to memory of 1396 2796 bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe 83 PID 2796 wrote to memory of 1396 2796 bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe 83 PID 1396 wrote to memory of 1608 1396 omsecor.exe 100 PID 1396 wrote to memory of 1608 1396 omsecor.exe 100 PID 1396 wrote to memory of 1608 1396 omsecor.exe 100 PID 1608 wrote to memory of 3096 1608 omsecor.exe 101 PID 1608 wrote to memory of 3096 1608 omsecor.exe 101 PID 1608 wrote to memory of 3096 1608 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe"C:\Users\Admin\AppData\Local\Temp\bc70b38d36135c7bff0caf0e97530ee0cc456c519fbfd7ec5d50f65004c56022N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD590f0b08a0aae5b13998cc48a2d176b2f
SHA1316b93f0d52050d8cb7c11dedcbb49c8441aa18e
SHA256e66905b24df487ce8445d9dcf12201bd2f3d8a78a0b78ffe90a9845cee60f488
SHA5122f3ccb6fbfda3548b9ace8c57d1b2948f389b5a86b4948c02e0e088bc47f65c0d8062c5133d7d38124754063cd70c742b6d123535ef689bbd8725e7828584cff
-
Filesize
62KB
MD521b5d3e59bacda15663ecafe0d357b3a
SHA13da1899ecf217834ed30507928199e2b3694f077
SHA2568aa9927883223e28d9e4cbbfb6d1ebf9b5b47a50bbcefc7cb901b89c117b08ca
SHA512b42292fdec291166456af8940163a327efc6bc403565ace13a88e172ba2b8eaa7639c819eb9526b6238669c273c4e55277fa92c580ef118ea5ab383b94d98d7e
-
Filesize
62KB
MD5d9eaf8b60b4c1965744fd9479395daa6
SHA1422d028e51118c7e50f4fb2aec5d1711e378fde2
SHA25697b7d68b90232d4a3a4f7157cf74a20f8dacdc5433e06a42fe54f82aab778445
SHA512b1fdc7c4a71049a2a46c59ea8813fa6d88282ab7b5a039337486be0d1406970c08da42c043196ae0d74bf89d9b8ff4533f75af115081a46298e518e9194c1af9