Analysis
-
max time kernel
114s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 17:11
Behavioral task
behavioral1
Sample
a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe
Resource
win7-20240903-en
General
-
Target
a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe
-
Size
84KB
-
MD5
2d3031ef5928ba69c69cc9d93183782f
-
SHA1
88ec3b7af45ba54a5fa37638005d1f11769c2d7a
-
SHA256
a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81
-
SHA512
7d2d7fd0728d9511c3ae010dc241abc607a0f5e6c41dd0a93028463b7eac3f4bf26834fff34d756fd83cf9f56311b969d78cba2cd1b95017c08344db3dc58b2a
-
SSDEEP
768:/MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA9:/bIvYvZEyFKF6N4yS+AQmZTl/5l
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1600 omsecor.exe 1752 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1600 3300 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 82 PID 3300 wrote to memory of 1600 3300 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 82 PID 3300 wrote to memory of 1600 3300 a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe 82 PID 1600 wrote to memory of 1752 1600 omsecor.exe 92 PID 1600 wrote to memory of 1752 1600 omsecor.exe 92 PID 1600 wrote to memory of 1752 1600 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe"C:\Users\Admin\AppData\Local\Temp\a8f67334daeebbdab3c4250a87f9b7591e22825419dce3a5793ecbaa0a722d81.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5791303a56e79a3aa5bc61a4732d26d4d
SHA1442947fd13a12f56d22b3a5e9ad0b69395efe3bb
SHA256078bd58b4ef24744bccc03ca8791c3b223f2084e95ae5321b4ab4194b354ad46
SHA512a44616fc5630d2999509522723ce8d6778b436bb57b84f0960bb3ed078becb57d55ffeee96862536f70b7911f7131870ad9ad1dedabd3a3050a8f6be8028acc7
-
Filesize
84KB
MD50504dfa6007f6c89c4a146cefb3b90b0
SHA18a61f11a61a55947dcc02a2651b266e7f1a840bb
SHA256714cd44ef3b203f69f9c76f1faaa603e8d5fc2b40906aff064c3f19a27b6bc06
SHA512c6b17a4b2b051597e449d6d98f1053ef9dab9bf37e433d9d5986f5903d6c0c099f05a2a0a35392afb884432dd481680b55b5a6e28f3635551e65f85748c4b8a7