Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 23:34
Behavioral task
behavioral1
Sample
7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe
Resource
win7-20241010-en
General
-
Target
7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe
-
Size
84KB
-
MD5
af6fc273d243e5ecdfbde224f897eb99
-
SHA1
851d74962a9ffd6d003a84beda7938d22eb6c4a0
-
SHA256
7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346
-
SHA512
2b02d9c761fc9ac8778dda06d8f4b99a7422889217c14f462cc7fc92f0dbf1c8783b060ecea85da1700c50a61e1971fbd00518f4d5faf57efb6b6f6a4dd21b87
-
SSDEEP
768:yMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:ybIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4532 omsecor.exe 3020 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4532 5092 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe 83 PID 5092 wrote to memory of 4532 5092 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe 83 PID 5092 wrote to memory of 4532 5092 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe 83 PID 4532 wrote to memory of 3020 4532 omsecor.exe 101 PID 4532 wrote to memory of 3020 4532 omsecor.exe 101 PID 4532 wrote to memory of 3020 4532 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe"C:\Users\Admin\AppData\Local\Temp\7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5a9f08bcdcc73543ab6cecdccf737aa49
SHA187e39182ffc1738e4642cb505a3e51afd9660793
SHA256b7c931051db06960743ce36207583d97d1bc36940c02cd98e59df7717c9fc8db
SHA5121008818d069c37d182f7d636339a6e49fe8f8a1fb473a0c547c91b9126cc4537d2adfaaa5f79f4b81af57a1fd08bc9170a0b30a0bea4eec8195ef7a484dfeb27
-
Filesize
84KB
MD505b663c559e01fb745e5007762906182
SHA1091d9fb4470efe9b5b736df3ac37b05e0063a9cc
SHA2561ab790eee5dc564b14a55655cd85a3d88c52ea041c9c28912ebbf3c11e3f1479
SHA51212ac56de6c729fe488f13cf01e2f1e124ec03aad3bd27f1cdae4049d3665eab414e0a7de2207f1b63a3decc3e8b4677cfddd6f3af2bcba4e203ac698f9a1d09d