Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 00:40
Behavioral task
behavioral1
Sample
01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe
Resource
win7-20240903-en
General
-
Target
01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe
-
Size
71KB
-
MD5
d588af58bca8629fe31730f728d519d4
-
SHA1
8fc9e20019467a2d59d0894bf8dd7becd39a55a1
-
SHA256
01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4
-
SHA512
334d6603c605ed9c29e52f4fc901b76472f50df72de52b051ed169633c2b215e1cc96f6f34a4561a924ab2948d84e75060eaaa171dafbc6294c458d3c0c19c0f
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHH:RdseIOMEZEyFjEOFqTiQmQDHIbHH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4484 omsecor.exe 2208 omsecor.exe 2832 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2444 wrote to memory of 4484 2444 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 85 PID 2444 wrote to memory of 4484 2444 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 85 PID 2444 wrote to memory of 4484 2444 01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe 85 PID 4484 wrote to memory of 2208 4484 omsecor.exe 104 PID 4484 wrote to memory of 2208 4484 omsecor.exe 104 PID 4484 wrote to memory of 2208 4484 omsecor.exe 104 PID 2208 wrote to memory of 2832 2208 omsecor.exe 105 PID 2208 wrote to memory of 2832 2208 omsecor.exe 105 PID 2208 wrote to memory of 2832 2208 omsecor.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe"C:\Users\Admin\AppData\Local\Temp\01676c9ca954f37508ad1b02c99c1445f060f9c21bb9f9981727f5d2fdc432d4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD559007362e4d82d1a0a498f815f21624f
SHA1b9c5f33cb86b72b0da1894526f9dbbba227884a8
SHA2567d2f509248e4705802bd9237c577f96c0a7ea606f59ace3dcfcb86fab06b92a3
SHA51237edd1b37f4009cf2ca8fa85334b5a65b59d6b94770504a3c8068337dc17bd704e975bdfc085813667d644c965a037d6fdfdd8c4e7cd9bec580a228fdfb8a1e1
-
Filesize
71KB
MD5792ebf8a97eac3a5791f30ce94ab93db
SHA1187256b276573b1990c5fdb2b4a7a1287f163c3b
SHA256634a4ac3b94135a0cbd2fc5e38331111651c5f53ab965c1a852d47392465139e
SHA5122f7d64419268ff04c39650616ee4a7c4d79015db7a0d1a9fbc2dc13a7ad4a43f907293035de1ece8cb4df49c9bd2c9c0749bda0c5f83aee71e542b22a303b087
-
Filesize
71KB
MD5ee8b3a80a2fe9f7f9cf0272689fcad5e
SHA1963f203a1842fdb54f0358b8d166e853d55a10fc
SHA256559c219646c6c8a6b3c0b8cd534f10ed6aacfa9c0e53348feec6f4d29f3ffa3b
SHA5129713562aa83395b99d16172552039aab13826f87b9cb961a3a58080846deb27fac7523963bac950154b1d48a1788e13a325f21f9b5c82687a79b3d49569f85a2