Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe
Resource
win7-20240903-en
General
-
Target
7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe
-
Size
33KB
-
MD5
af75ff6f7d516b8f396e7ab5d0a2bc80
-
SHA1
3ce0bab9d5280283007fe420f311f42c0baeecf6
-
SHA256
7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3
-
SHA512
a85b438b16dac783c35b6b55ce8442c3727bbc7e0fa6a0cf073c9f72c02d210931eb8688842b61465efab2fad23a4013ecb5d0bc14ce3a6bf3c2b03d47819e64
-
SSDEEP
768:HfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:HfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 900 omsecor.exe 3108 omsecor.exe 1184 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 764 wrote to memory of 900 764 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 82 PID 764 wrote to memory of 900 764 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 82 PID 764 wrote to memory of 900 764 7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe 82 PID 900 wrote to memory of 3108 900 omsecor.exe 92 PID 900 wrote to memory of 3108 900 omsecor.exe 92 PID 900 wrote to memory of 3108 900 omsecor.exe 92 PID 3108 wrote to memory of 1184 3108 omsecor.exe 93 PID 3108 wrote to memory of 1184 3108 omsecor.exe 93 PID 3108 wrote to memory of 1184 3108 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe"C:\Users\Admin\AppData\Local\Temp\7fe63f0840c48a6d0c23307f1e98c1a35e062431597eff16855ce8917afe01e3N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1184
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5078cc6421e553f3182b192d77b586eb0
SHA17b60d985d291f822459a1bc0d64c9e526d6d8de9
SHA256246a1b6861059b7349dc0b9155eec6d55c22c7ae4f56b221c5fc051f985db058
SHA5124aab6f0de6fb0fc6fa520a6c8de42ab85e6d05d7acb3e199638eb6a977a4f44d1602fb5a8d03fdb5dc4eea29e8ae6414c8a39bede7249434bf130645ecc6ccae
-
Filesize
33KB
MD5a4f71c1a07f013e405f1bc2758e895ee
SHA133b256f0849ee220735183c4a2f4668be200363a
SHA2561816eed7c7c88fc77bf5f668291b6e9a919dd82c8f8339d4db7a017f155fcd28
SHA512e0879230055968df60ee48cb94497c2292cbb8196e891f06d45322e302970f9d49413ef7a1e02f9eef61e49fed7f3505e8c83f81d4077c205ade32d711954502
-
Filesize
33KB
MD51452bf9e70443fc8cc46b006b4af6611
SHA12c59a795689a3368e0d10e0d8b65754aa7ec29c3
SHA256c6493d19e2ac73d151e9eb66d08116dccc302b26cda824993a25ec8cda76e68a
SHA512a265b2a7601431a0e9b87c00fde0d3a2b7f4235db180b036f1f1bd3871981a00fd74c1958233c06071029176d9d7f9ca80ffdcecd300d70c0e10df69d060e419