Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 07:43
Behavioral task
behavioral1
Sample
0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe
Resource
win7-20240903-en
General
-
Target
0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe
-
Size
61KB
-
MD5
56525fd577862dd0a94ed4a7731fa970
-
SHA1
7f327ac5b52d96a43c258e7e2800f57a011b7c84
-
SHA256
0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a
-
SHA512
c7bade7acf19702b1c78aaa1f2548be9d023809a8289023a26e3062393e7b9df9aff06990212e9fa1778aa13a0e546d7406ed8a0b931e1edf5ef3ff5583902fe
-
SSDEEP
1536:sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5f:UdseIOMEZEyFjEOFqTiQmFql/5f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 736 omsecor.exe 3032 omsecor.exe 1656 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2124 wrote to memory of 736 2124 0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe 83 PID 2124 wrote to memory of 736 2124 0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe 83 PID 2124 wrote to memory of 736 2124 0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe 83 PID 736 wrote to memory of 3032 736 omsecor.exe 100 PID 736 wrote to memory of 3032 736 omsecor.exe 100 PID 736 wrote to memory of 3032 736 omsecor.exe 100 PID 3032 wrote to memory of 1656 3032 omsecor.exe 101 PID 3032 wrote to memory of 1656 3032 omsecor.exe 101 PID 3032 wrote to memory of 1656 3032 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe"C:\Users\Admin\AppData\Local\Temp\0fd2a258a3498905a7f0e2a9842d87586794b832f173579d00ca505f1fb0f59a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD503da16078c778bc34fe2cafc526399f9
SHA1950e7aabb5a26d9d54a7c34d8f895952bc04fff1
SHA256959835b289b319c9558c4d567a488ccd2ecd74a26cc8627fb38d5683410b2830
SHA5124357785dd558cc613fb124c830e23fcbedccdd78c1b752a829e0bb6033d6c2eb2904a8ea6c7ea5e83aa5f3f0603969ad37eb9fa28ca2f74490752cd59d442e5b
-
Filesize
61KB
MD5e8e30a3de564cdaf28828c1fd9704582
SHA1125ea2734fd359c935874906016012baa0c23965
SHA256459707c5c74167112e692226cd0dde4e7f5fe3fd0c7dc0338d96f92e11a65b57
SHA512233914133290aaf2c7fb9a955afd630c5c9978bfb556456145e5a466ef67b20ab2d44541284927dd638ffef2bb746ba15afdc00eabd4a23f6a624e8f7002f91a
-
Filesize
61KB
MD5db2fcc3caf4fd142067aaef470a15af7
SHA1538b5db32d0453950eba3fcfb735b1704d492af7
SHA2564d6333c6d17a216e2bd45d71aaf8a5db4c804a619375edaa6e37f27b2dd1fa13
SHA5124c8d595f4dd1ead7876eb5d982dc48dbdac6ffc88c6ab1968fcdf0f2fd59c67ec35775b8d368861fb7d5f9362c3a1d345c46c11af94279c793e805962ea04b9a