Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 07:41
Behavioral task
behavioral1
Sample
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
Resource
win7-20240903-en
General
-
Target
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe
-
Size
71KB
-
MD5
6d3c3df79012ec40a3ba1614656c0099
-
SHA1
0b55f5ceec915b607b1affdd2e95ceee903a4ff9
-
SHA256
b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92
-
SHA512
0e8e040f70d984097b83907da7e46c428b7910034ae529d365d6cd5490ac908015737a0c38e9ef426a38d2b2dd25b70ccd041c5014bd7dc137404ac9ec2caa5b
-
SSDEEP
1536:gd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHF:AdseIOMEZEyFjEOFqTiQmQDHIbHF
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4280 omsecor.exe 3984 omsecor.exe 1880 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4280 1144 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 83 PID 1144 wrote to memory of 4280 1144 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 83 PID 1144 wrote to memory of 4280 1144 b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe 83 PID 4280 wrote to memory of 3984 4280 omsecor.exe 101 PID 4280 wrote to memory of 3984 4280 omsecor.exe 101 PID 4280 wrote to memory of 3984 4280 omsecor.exe 101 PID 3984 wrote to memory of 1880 3984 omsecor.exe 102 PID 3984 wrote to memory of 1880 3984 omsecor.exe 102 PID 3984 wrote to memory of 1880 3984 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"C:\Users\Admin\AppData\Local\Temp\b909e37a8d4b4f0592eb31bc62679c1bbaecbc22cc9a9d3396d5cf575aec1b92.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5e55cfd909c91bdb7ebad8327b2f104d3
SHA1fa02b52e841533ca360eb2e6b5db450b1bb476f8
SHA2568ee9a15b11674c1e3b48235417b942d64e5539f322b64b6a87ebb17b7825a102
SHA51248d8bd29b2202d29c768624641e6a2c32974d40c4301987b6b1ad782f866d695af9d5cc1025eaf1cd4c2d3978c43e29e794dd21a1a81bb488b1591db9c2fd7c4
-
Filesize
71KB
MD5544831c578b4780d95ba804000b0f67d
SHA1333ab43ae921baf46763ad5de733e6551e7949ba
SHA2562d94dac9e53702b513c338196f3c56a5c49978a6c3b2a863591d4310447b84ce
SHA51296d9c7fac6f9c3122c98f9798adb74cc7a5730696262e368bd4583f1e8548ebf3e521b76ad94ff3fab433bdd080fcf91efbf055eaa175d76af419cd4d5273434
-
Filesize
71KB
MD5d3eee7a2bc1c26a718ce7a934956f192
SHA199123f6b77bcd4e16479fc28fe7cbbd3df2e9b0a
SHA2561e8c7d36b9ca58ad0f5423d707051d775500e14c98020dc6a0cd1a87089017b3
SHA512395b32dcb63442e110e6c2c6ce486ec448d46999ee530558d03434eb77e2291f05394c367212cb8a87f4db0613ec52af98031e59d5de46de1db7e2c6343c0c30