Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 22:02
Behavioral task
behavioral1
Sample
4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe
Resource
win7-20241010-en
General
-
Target
4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe
-
Size
90KB
-
MD5
ed576037d42534c801be3e1bf101eaa6
-
SHA1
a14c6e7c04a49a1fb4bbeace71fe5604990c8540
-
SHA256
4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e
-
SHA512
45d2624e50ba4606899feb6261ab87471e6b8c93ca1a4bc4c0ce223e77fdeeb6cbf53f7c195dd022de8a9976e4e13e1b4100c2053c58f8f4be2dc61a0a8c062b
-
SSDEEP
768:sMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:sbIvYvZEyFKF6N4aS5AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4576 omsecor.exe 1600 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4576 4260 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 82 PID 4260 wrote to memory of 4576 4260 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 82 PID 4260 wrote to memory of 4576 4260 4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe 82 PID 4576 wrote to memory of 1600 4576 omsecor.exe 92 PID 4576 wrote to memory of 1600 4576 omsecor.exe 92 PID 4576 wrote to memory of 1600 4576 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe"C:\Users\Admin\AppData\Local\Temp\4ff1c844fac610faa830a194e362496233d5f40bbaf4d9b47a45facfbcae020e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD540774d67199bc0af539159785171ea47
SHA1c50cb7dd81c9b57e0026914fe0cdce9cbbff6012
SHA2567d1303035edaa270937d8d4f630a04013d66c162d02cb41c1ec9b4c9e64ddeea
SHA512c3c687582aa4aeb5fdf95a14df88d34372fa6324c939328dab48b57889dc4e7a7e3c6aa1ec032aa2727adcec4222950eab469a7750bc2b443e15646768469ecc
-
Filesize
90KB
MD5325585d193bacd643b27512f25a62fa4
SHA18dbe4c81b67c007de4282101f24ae7086a4fecfa
SHA256e3c3512c73739a131501d5cd341cee66a515962e98640b9b879c2e361e55722e
SHA512e04acfa79aa8a5e0d4a0372fcf252168cd6edbda78a3e7334871335b832e1b257ec7f513e998fa583f56248bd19ba8a6d79a96be01325085f07256a2c4221cd4