Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 12:58
Static task
static1
Behavioral task
behavioral1
Sample
52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe
Resource
win7-20240903-en
General
-
Target
52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe
-
Size
33KB
-
MD5
8eef2c3025fb9974e0f0b42b6a5c570e
-
SHA1
34ac41720ca5aedb54c119795c713dd5deab0443
-
SHA256
52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba
-
SHA512
d9eccd1da5b4be77e1dcb3a4e61631004d9278a63688e67c15163bc89982fb76e090f4cda7390995c82eaa0dcf01435240a9f0c7071f658d64dcc11542a94fc7
-
SSDEEP
768:efVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DF:efVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2936 omsecor.exe 1472 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4852 wrote to memory of 2936 4852 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe 83 PID 4852 wrote to memory of 2936 4852 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe 83 PID 4852 wrote to memory of 2936 4852 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe 83 PID 2936 wrote to memory of 1472 2936 omsecor.exe 101 PID 2936 wrote to memory of 1472 2936 omsecor.exe 101 PID 2936 wrote to memory of 1472 2936 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe"C:\Users\Admin\AppData\Local\Temp\52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD56cd1763b94ef41dbca7e275fc3f46bd9
SHA1bfdebfcece3d4662bacaa4d82f8028f3b73cc87b
SHA2561cc47a53ffdcd8864c0af30e800408124a2c6ee7c059ca8f9303ad28b4bb09b0
SHA512af3b1625c5c82a7a205405b93a1ece4fffa4a6691cbc76f6e4a4ab66af1b2273b2283f659433e699bf9385933174155f7dc4e3dd7993854c733ee438396cdb2e
-
Filesize
33KB
MD571ac9dbff004f940f6a07c2882c5f161
SHA1afe267e415c2c7b241949b60e3dd194fbeb53222
SHA2561969aaebe8fbd0b7c0eec13a1ffd9bb512c7e2e3c38fbdbe1a27c9ac27db7fba
SHA5129aeb4f9b4caa506d7ba0d469b1a9b7d10582f837d4ae35e2d1a58347fd1ce8256035981f742eb1529ddb22ccff9a57c31627fab156721de6e1284e0ab734e94c