Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe
Resource
win7-20240903-en
General
-
Target
52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe
-
Size
33KB
-
MD5
8eef2c3025fb9974e0f0b42b6a5c570e
-
SHA1
34ac41720ca5aedb54c119795c713dd5deab0443
-
SHA256
52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba
-
SHA512
d9eccd1da5b4be77e1dcb3a4e61631004d9278a63688e67c15163bc89982fb76e090f4cda7390995c82eaa0dcf01435240a9f0c7071f658d64dcc11542a94fc7
-
SSDEEP
768:efVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DF:efVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4352 omsecor.exe 632 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4420 wrote to memory of 4352 4420 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe 83 PID 4420 wrote to memory of 4352 4420 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe 83 PID 4420 wrote to memory of 4352 4420 52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe 83 PID 4352 wrote to memory of 632 4352 omsecor.exe 100 PID 4352 wrote to memory of 632 4352 omsecor.exe 100 PID 4352 wrote to memory of 632 4352 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe"C:\Users\Admin\AppData\Local\Temp\52578dce0a7fb82f7e6e3c094d7e7171ea01627f9556086cb798b3d45c3a78ba.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD56cd1763b94ef41dbca7e275fc3f46bd9
SHA1bfdebfcece3d4662bacaa4d82f8028f3b73cc87b
SHA2561cc47a53ffdcd8864c0af30e800408124a2c6ee7c059ca8f9303ad28b4bb09b0
SHA512af3b1625c5c82a7a205405b93a1ece4fffa4a6691cbc76f6e4a4ab66af1b2273b2283f659433e699bf9385933174155f7dc4e3dd7993854c733ee438396cdb2e
-
Filesize
33KB
MD525205ba8728436cf61fca7e7e3cbbd52
SHA189046954e1e7cbaea83fb960a05f0d849ab61f92
SHA256d76249c5ea672afac8bd17699753f7826c6dfe4cf05d4c5bd9ab29644f3946e3
SHA512218c75d7b5657b2849cbd36f0c206ecfdb47c857e8db7ecce2c9735f60ef7084c7e7c45e0b6e1bc785feee7bc2d648cbdc2917ca53783c3278945f7ba6483a10