Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe
Resource
win7-20240729-en
General
-
Target
ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe
-
Size
33KB
-
MD5
63455487816642b6f08505cd82b1f3d7
-
SHA1
49573025461b6e35bb8453d00de179b0cdc90c69
-
SHA256
ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7
-
SHA512
6c38a8af736c0235e5dc5809d50b54a29c9af41ae5cf4985a3f3c9b3347a93fc2f6280f92d8505589115a79e9312270279999ebb11e4ffd81a8d89f4b6ce935a
-
SSDEEP
768:XfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:XfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4824 omsecor.exe 4316 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3892 wrote to memory of 4824 3892 ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe 83 PID 3892 wrote to memory of 4824 3892 ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe 83 PID 3892 wrote to memory of 4824 3892 ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe 83 PID 4824 wrote to memory of 4316 4824 omsecor.exe 100 PID 4824 wrote to memory of 4316 4824 omsecor.exe 100 PID 4824 wrote to memory of 4316 4824 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe"C:\Users\Admin\AppData\Local\Temp\ed947bcdfd68e8defec90b566666abda203065d607965773c54795b57383e6c7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b26285a0904487da364ddcace132aac3
SHA149158fa42173bb391cd5de110da5f6d2294b96db
SHA2566414907418c56bf9e8241631a0ebfa013e310bf66982731f76beaa7818ffd6fd
SHA5121a41e6304e2d3939e16a8b3528b14019e537b6c540c3c55b745fa46a468db804e064c452fabee460988bbb2dd37c30af42e9b09623cb9de00383407dee9ceb77
-
Filesize
33KB
MD55a6b72df554975a42e884955de8e83b0
SHA120775ec08863470e11574d16a46111e94886d02e
SHA256b53daf97534f5fb97aa75a069e62d1c031eb4dab0c0817019e56ac593215df9c
SHA5120ac0e0b819789786058e4a2dab3c031f47a5f1b5afe4ebe258eef8c09a812a2ae243b961b0db74bbde54fbe073cf6cf19d583b8e43dbcba1f0890e5d054578c2