Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 22:19
Behavioral task
behavioral1
Sample
4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe
Resource
win7-20240903-en
General
-
Target
4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe
-
Size
76KB
-
MD5
7386d580dddefe874edb2d7825c51d52
-
SHA1
16309f985e351bc5b34d99c5ab17ad9552ba50c9
-
SHA256
4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e
-
SHA512
9b21054776bfd9462d5b6f0ebcf4f88605cb44921b0831fd1025a4d2e873501f27f45ccd366792a6e3b158594d4eaaad29afa81909c7f65e76120c2b123d11f1
-
SSDEEP
1536:yd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w113:CdseIOMEZEyFjEOFqaiQm5l/5w113
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3184 omsecor.exe 4176 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3872 wrote to memory of 3184 3872 4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe 82 PID 3872 wrote to memory of 3184 3872 4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe 82 PID 3872 wrote to memory of 3184 3872 4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe 82 PID 3184 wrote to memory of 4176 3184 omsecor.exe 92 PID 3184 wrote to memory of 4176 3184 omsecor.exe 92 PID 3184 wrote to memory of 4176 3184 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe"C:\Users\Admin\AppData\Local\Temp\4fbce909ae0da37ed40da1c8aab0696eb797ffc637be1cf103dc9fbca8539f2e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dab49e619379f458c7a6582d0eeb0f1b
SHA11d33c576343b33626a103e29602ccdc7fb805d8a
SHA256980663429cbf08ed014e5eea03325c92b28d886046f7b8754e38de5019fe0498
SHA512a3266a09c344f55b447b423d7247ba9c727c48ba1ec40ec132749a5642dc9dbd10e1d2e80945fdfcb6e178c1e67e0107e6e8ef89863607823cb3916798984550
-
Filesize
76KB
MD56c7c891470a58715145782e783eda8ac
SHA16b34a9e5ad0e114955c431da7882cdb7bac518fb
SHA256d6f83a562d90bd8de9622cf6cdb3681eadd844c7673f9105f2a97a469f7b8ffc
SHA5129a6eed38be64d04072704828b0a3ffd8bd2eef30f36a616702030c7aaf3c23192eab27dc613137b603e77a5039252f539c063d6121ff754e1114e314c660ee3b