Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 23:41
Behavioral task
behavioral1
Sample
7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe
Resource
win7-20240903-en
General
-
Target
7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe
-
Size
84KB
-
MD5
af6fc273d243e5ecdfbde224f897eb99
-
SHA1
851d74962a9ffd6d003a84beda7938d22eb6c4a0
-
SHA256
7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346
-
SHA512
2b02d9c761fc9ac8778dda06d8f4b99a7422889217c14f462cc7fc92f0dbf1c8783b060ecea85da1700c50a61e1971fbd00518f4d5faf57efb6b6f6a4dd21b87
-
SSDEEP
768:yMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA:ybIvYvZEyFKF6N4yS+AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 852 omsecor.exe 732 omsecor.exe 544 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2276 wrote to memory of 852 2276 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe 83 PID 2276 wrote to memory of 852 2276 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe 83 PID 2276 wrote to memory of 852 2276 7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe 83 PID 852 wrote to memory of 732 852 omsecor.exe 100 PID 852 wrote to memory of 732 852 omsecor.exe 100 PID 852 wrote to memory of 732 852 omsecor.exe 100 PID 732 wrote to memory of 544 732 omsecor.exe 101 PID 732 wrote to memory of 544 732 omsecor.exe 101 PID 732 wrote to memory of 544 732 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe"C:\Users\Admin\AppData\Local\Temp\7fffa69118d4cf3f2edcd938eb23b0956268064df727c694626a1976e264a346.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD50c5914489612caa2af9a832f4c25f49f
SHA1d414f50b258999644ed579d679b267328d6b26d6
SHA25680109ca572fac338478b68732f0c011d456e8c6ed24237ae3eeef9a022a71fc1
SHA512b8ed0f1bb1e129d30d6d0a13235a5b8c1252c867e42bec2066ffab9a2b2c84ad2abf5feeed194af997e9be7b0d087aa3742eec88d14150333f2f0b38efe10600
-
Filesize
84KB
MD5a9f08bcdcc73543ab6cecdccf737aa49
SHA187e39182ffc1738e4642cb505a3e51afd9660793
SHA256b7c931051db06960743ce36207583d97d1bc36940c02cd98e59df7717c9fc8db
SHA5121008818d069c37d182f7d636339a6e49fe8f8a1fb473a0c547c91b9126cc4537d2adfaaa5f79f4b81af57a1fd08bc9170a0b30a0bea4eec8195ef7a484dfeb27
-
Filesize
84KB
MD5fba1ab35b1c3ea45366025d71c0327da
SHA1bbcf12a476ce800fb4735b996002b62aedda579d
SHA2564f74361648d8dfd8909a62a8b86f8dc8bf57b5641e3f89ea41c6334d3244af24
SHA512ac30d56ce97a37131e6f743a507f501f291b8c0188adcd46cc71a00a03929c5b204e9b190739e3d415479d330b96af7466a40ef93197c986889c025c01183913