Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 03:43
Behavioral task
behavioral1
Sample
ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe
Resource
win7-20241023-en
General
-
Target
ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe
-
Size
61KB
-
MD5
30b78332b12da915a353d82b9707a34a
-
SHA1
fb10fb84b936d886b18b8b1d7880b5f681ba6dc9
-
SHA256
ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e
-
SHA512
3e7eff7aa24b70c927b5ef45caa87249e7de55c8f7d672c1923793b1cdff779dc4536a61854b57c4794f3f4b2abb1797451524f6e2d6e94d9b6c6e4b6417d786
-
SSDEEP
1536:nd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5P:PdseIOMEZEyFjEOFqTiQmil/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1340 omsecor.exe 5032 omsecor.exe 3180 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 436 wrote to memory of 1340 436 ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe 83 PID 436 wrote to memory of 1340 436 ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe 83 PID 436 wrote to memory of 1340 436 ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe 83 PID 1340 wrote to memory of 5032 1340 omsecor.exe 100 PID 1340 wrote to memory of 5032 1340 omsecor.exe 100 PID 1340 wrote to memory of 5032 1340 omsecor.exe 100 PID 5032 wrote to memory of 3180 5032 omsecor.exe 101 PID 5032 wrote to memory of 3180 5032 omsecor.exe 101 PID 5032 wrote to memory of 3180 5032 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe"C:\Users\Admin\AppData\Local\Temp\ebc74c046332585238d2fa83ba8ffd7a9a1ee699ecb099e1849daf4b2b1a606e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3180
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD51535372108aac5008d2e47c261435c78
SHA10ea1655530ceda639a10658b3de03c5052c508b3
SHA256211983a47b0dc3a1a98f4090377b76fdee1591499ef34c7e5536921503d0eede
SHA512afd7be819e7b863e8c138c37bc01462cb18cbff1258baf77b6ecd6353a5ee6cff90269098337a66a62866eaaebe8f92944e34e5a6b158de0471c6fc8d8d4718a
-
Filesize
61KB
MD5c7f133d46260b0777bb0d10892721846
SHA1cb69e6fbbba918aae93c572d1f42fb58da4f56ce
SHA256a8699ba45839404d5817dafeca6ca7f4ead6f6b57f295b6d7de100c8f127ee96
SHA512a81ced56da8c787e60c5473564490ffe40a00a813784ea219860670f54de1f2e48d84ea8ce5b92545bbffa8c1ca79d6a3a793673a6a05a1f71809e7c73e853a9
-
Filesize
61KB
MD5fd1a936877bdeb0decd5e71277cf460f
SHA107fa473642639e1b8896359c44cace07bc3d7f38
SHA256f22cb282fb8e9708cc6eec4ccdbbe45817224c435d801ff08566c2b31460f883
SHA512e84937ccf0a510213f0faf3493f217c8db2575be9255bb7fbfcd824653a5c076b81f8333eecbdbb7496ffc531eec5f76877099c5135966022cb14d111eefc5e9