Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 23:01
Behavioral task
behavioral1
Sample
6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe
Resource
win7-20240903-en
General
-
Target
6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe
-
Size
84KB
-
MD5
ac9c173d944ca0a08bbfc1ac25f27317
-
SHA1
39b40b502c1dec272adc50b8b54f7b9c31d0c598
-
SHA256
6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c
-
SHA512
50c76bf6ba398b4604396710028f575ca95b7924e84013f884f7aa8adb5b1759ff451fa0a92bd5eec4137f1747f83c73f78f8a019ab1c409a0f07dca6cbc4fa1
-
SSDEEP
768:PMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:PbIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2232 omsecor.exe 4668 omsecor.exe 3308 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2232 1892 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe 83 PID 1892 wrote to memory of 2232 1892 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe 83 PID 1892 wrote to memory of 2232 1892 6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe 83 PID 2232 wrote to memory of 4668 2232 omsecor.exe 102 PID 2232 wrote to memory of 4668 2232 omsecor.exe 102 PID 2232 wrote to memory of 4668 2232 omsecor.exe 102 PID 4668 wrote to memory of 3308 4668 omsecor.exe 103 PID 4668 wrote to memory of 3308 4668 omsecor.exe 103 PID 4668 wrote to memory of 3308 4668 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe"C:\Users\Admin\AppData\Local\Temp\6ee0fb6728ab3f8054586aed3375af862f78ae520132a24b1058d0ef72fa325c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5e5ffc4137fb3ab288726567a9d77278a
SHA14986ad215757e69738e21d9dc6d453a7f180c80e
SHA2560e5769e2b332638f2f46ab6ed6e5ee365e19e6442cb108a2a0a23cc993900c29
SHA512a8c6082f610979fb9e89327c799294bf17dc9579bf9685d37464688a1143a055d9e3696f1813795a28e2a9cb1627d1b7d5fcfb0d216de4078aaca9ab0e674c65
-
Filesize
84KB
MD517be0dd8a09676cc323f82f308c7d6ee
SHA1aad60e6e45a548267f6798d741026802a3b60ee5
SHA256724222661c910da5aa78e68e9140eb48f45f36374f1ff263fc992197822b1dd7
SHA512f9faba5586861176b7e7332051f05476f75bc818cfa9c6556f6d09b851e03dc662d0633b4dca046f7566ae8e7d37183f3e2145dbdf5196cbb286fd104870cf16
-
Filesize
84KB
MD55dd48a7062fe75d844778b6e47004f63
SHA13ae6831f91a902f203ffc0ee00b5ef9d0ba4ec61
SHA25609808c3f8f03c7953faccd60dad995629d08b153908e85a4295ed4f26b5d9845
SHA5121b63dbebb6cd78784226716e141dba9725c1d68e230e04ca2df3a5b618c6b386d676ab47abc2dd40b73b8dff5134f53ec5e9aab34c76551293c9df0e78ee84e4