Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 22:55
Behavioral task
behavioral1
Sample
6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe
Resource
win7-20240903-en
General
-
Target
6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe
-
Size
84KB
-
MD5
ac9c173d944ca0a08bbfc1ac25f27317
-
SHA1
39b40b502c1dec272adc50b8b54f7b9c31d0c598
-
SHA256
6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c
-
SHA512
50c76bf6ba398b4604396710028f575ca95b7924e84013f884f7aa8adb5b1759ff451fa0a92bd5eec4137f1747f83c73f78f8a019ab1c409a0f07dca6cbc4fa1
-
SSDEEP
768:PMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:PbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4232 omsecor.exe 1212 omsecor.exe 2128 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4232 2524 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe 83 PID 2524 wrote to memory of 4232 2524 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe 83 PID 2524 wrote to memory of 4232 2524 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe 83 PID 4232 wrote to memory of 1212 4232 omsecor.exe 101 PID 4232 wrote to memory of 1212 4232 omsecor.exe 101 PID 4232 wrote to memory of 1212 4232 omsecor.exe 101 PID 1212 wrote to memory of 2128 1212 omsecor.exe 102 PID 1212 wrote to memory of 2128 1212 omsecor.exe 102 PID 1212 wrote to memory of 2128 1212 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe"C:\Users\Admin\AppData\Local\Temp\6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5cff415ff5a9a2ac643a421ce182594f5
SHA178341676cbdbb8f82f32c7162247a2242675ad3c
SHA25686514ff059b3494294fc78b7eadd26ae52159f7ac1f26bdaf2688e724166153a
SHA512b1a50fd7a142a1196d076c90af7bae051be1ca1bd1bc6780e95a434308d94b746db42d748d7b02374e8ba48dbfba911727b3f46b9340d3eb9080cd72e9249bd4
-
Filesize
84KB
MD517be0dd8a09676cc323f82f308c7d6ee
SHA1aad60e6e45a548267f6798d741026802a3b60ee5
SHA256724222661c910da5aa78e68e9140eb48f45f36374f1ff263fc992197822b1dd7
SHA512f9faba5586861176b7e7332051f05476f75bc818cfa9c6556f6d09b851e03dc662d0633b4dca046f7566ae8e7d37183f3e2145dbdf5196cbb286fd104870cf16
-
Filesize
84KB
MD5e80d30fb6ca149d0b134d6da6e7fa5b5
SHA1df51a44df11296ca10b872ae2f6c484cfeb0555a
SHA2566f1ad8d115a84a8913823c472e54a911b947125c883c6cad049441617b0ea247
SHA5127858aa82875319b4152289ded5a860e02de051697a15c415511efa6f0d3a3b517a558b200fba4049edeb724958889032b1af42f2e5c54d565023ee4e609ab606