Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 20:58
Behavioral task
behavioral1
Sample
32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe
Resource
win7-20240903-en
General
-
Target
32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe
-
Size
76KB
-
MD5
a9713078c7fd3535245a036aa3a9f777
-
SHA1
84851ede7b2b766e2dec5878fcdfbdaa817ba3b7
-
SHA256
32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520
-
SHA512
f4700e4a2546a08eca77ba4de92cf99bfae9fb0e888ca80d23065b9bbd49463691fdc3697c9e3cf2f7ebe209cffbd4562ccfeb846c276f26f2f44365290fe5af
-
SSDEEP
1536:Pd9dseIOcE93NIvYvZEyFhEEOF6N4yS+AQmZTl/5s11:ndseIOKEZEyF6EOFqTiQm5l/5s11
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2796 omsecor.exe 848 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2796 4636 32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe 82 PID 4636 wrote to memory of 2796 4636 32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe 82 PID 4636 wrote to memory of 2796 4636 32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe 82 PID 2796 wrote to memory of 848 2796 omsecor.exe 92 PID 2796 wrote to memory of 848 2796 omsecor.exe 92 PID 2796 wrote to memory of 848 2796 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe"C:\Users\Admin\AppData\Local\Temp\32f795de88acd19c31b9a5df534721c307900c4223a9ff4e520146ac6458d520.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5cfeb43c1b2dac22e3ca8b6e62dd67d3a
SHA162e652a6ee96d4491c95b72d5a9a794584b6ac23
SHA2567870bf2676837f2f74ebe62ea42625844fd9b771ac324fa1147a49b622cab150
SHA5129833e415ad121040aed8f6b46c4b8fcdcf24f7bae13f0aba02367fda8b67953da7ba65a5204eaa8db9c9e483e447a6839aa2e697cc0d75d67d183f397e38d957
-
Filesize
76KB
MD59c79d215d39704f83dc59c4f5eadd8fe
SHA14d223ea96776cef0b2dd2f11195104df80fb2c4d
SHA256e0382574a830c65b92d51850336fff90cd0d3fb741eee10211c63e0417ee89a6
SHA51288badb55a5e36431b6c75725687676278cc3216d451f70ae983f2454d1fc3a6de3387521a20e5dd51110d1ae33fb62ed5a34beaf6a19a88c5e0714066bbe7a61