Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 00:35
Behavioral task
behavioral1
Sample
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe
Resource
win7-20240903-en
General
-
Target
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe
-
Size
64KB
-
MD5
ba95bb9829385f2f3eb1a7d8a043f151
-
SHA1
3afc10065aee0791ef19e84375966c0165ea4eb9
-
SHA256
90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe
-
SHA512
c2d71d0e421bdb77a7dd8799ffe158cb6728ce7467e64ed23597e7b060cd324a7dabcb691c32476be3570b06a27f17e63a794991165a7355efffc95df9baac74
-
SSDEEP
768:BMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:BbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1636 omsecor.exe 5024 omsecor.exe 2096 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1636 2544 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 83 PID 2544 wrote to memory of 1636 2544 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 83 PID 2544 wrote to memory of 1636 2544 90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe 83 PID 1636 wrote to memory of 5024 1636 omsecor.exe 101 PID 1636 wrote to memory of 5024 1636 omsecor.exe 101 PID 1636 wrote to memory of 5024 1636 omsecor.exe 101 PID 5024 wrote to memory of 2096 5024 omsecor.exe 102 PID 5024 wrote to memory of 2096 5024 omsecor.exe 102 PID 5024 wrote to memory of 2096 5024 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe"C:\Users\Admin\AppData\Local\Temp\90b22d88f5a5a9d9610dadab13a95305b42597845623423bc3ca2cb37dbd9dbe.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bf426dc605e38b1155f3b9ac95581ceb
SHA129455f057e9b00678857bdd65e1bd7d06689eb62
SHA25657d3e241f9ed766764e991283de6480410a46d953d98d93de0fd8bfd67a3bfda
SHA512dd4c31c15bf92fb1832123fe85602e7665d84fc6ce435ed4e2544a24de07a63c7714d5b2dbca029f65f9bc77e20b330ad6a51bc417bd89ef20d06b15680d8a9b
-
Filesize
64KB
MD59e0a955da113d1de1e82afdf2e8464df
SHA161b531f015149c0c82aafc96903ae3557e574e39
SHA256ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009
SHA51295d18bd2e1d650ec2d0eb13cd4ffd9bb291313599510663a1def54b06e1e7074a7a4ec090eb2ccf3e19e262219834bd74405e9be352c426cfbb1d92cfa34f5bf
-
Filesize
64KB
MD5166eb3292e4bb19943adceeff238f3f7
SHA1c6d5cde6914d011ee9fe7d0185326b1dfef766b1
SHA256bd02d01b8eee4e61e98bfad5a4700225fd9762fffa31d4a539709e0209d83de3
SHA5126a5dccbee1a33d9082a2218f8fd20c7e8f1a782b0d7d786f91b0f56f99db2d44035858926bb3a62f463f0e994b71fb640f77ea337e849d1b9f6e9b82fbea741c