Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 07:32
Behavioral task
behavioral1
Sample
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
Resource
win7-20241010-en
General
-
Target
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
-
Size
71KB
-
MD5
6d3c3df79012ec40a3ba1614656c0099
-
SHA1
0b55f5ceec915b607b1affdd2e95ceee903a4ff9
-
SHA256
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92
-
SHA512
0e8e040f70d984097b83907da7e46c428b7910034ae529d365d6cd5490ac908015737a0c38e9ef426a38d2b2dd25b70ccd041c5014bd7dc137404ac9ec2caa5b
-
SSDEEP
1536:gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHF:AdseIOMEZEyFjEOFqTiQmQDHIbHF
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2688 omsecor.exe 2908 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4304 wrote to memory of 2688 4304 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 83 PID 4304 wrote to memory of 2688 4304 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 83 PID 4304 wrote to memory of 2688 4304 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 83 PID 2688 wrote to memory of 2908 2688 omsecor.exe 101 PID 2688 wrote to memory of 2908 2688 omsecor.exe 101 PID 2688 wrote to memory of 2908 2688 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5544831c578b4780d95ba804000b0f67d
SHA1333ab43ae921baf46763ad5de733e6551e7949ba
SHA2562d94dac9e53702b513c338196f3c56a5c49978a6c3b2a863591d4310447b84ce
SHA51296d9c7fac6f9c3122c98f9798adb74cc7a5730696262e368bd4583f1e8548ebf3e521b76ad94ff3fab433bdd080fcf91efbf055eaa175d76af419cd4d5273434
-
Filesize
71KB
MD5117651c1724e0e3d8db39b45d546c5e6
SHA1e92774fe36b70d6811ed27932ef7f28568373d07
SHA25652512c0bfae13671d0dd72eaa6847f8fa52430ff74f584c45860e6a419883e99
SHA5126128fc031bfa09ab32029f002b34854c68d0a57dbf70f6f889ff3a8f9626efb85588e8661169a2e3187c4a32ae88be5785a088b69827b41bf276eb7de6a28bf3