Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 01:45
Behavioral task
behavioral1
Sample
0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe
Resource
win7-20240903-en
General
-
Target
0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe
-
Size
61KB
-
MD5
77245a4a45c944b85682193addf28ddd
-
SHA1
6c410ecb4203d6d2641dc2dd4cf8d745a6830379
-
SHA256
0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3
-
SHA512
2810bb8812799cad2865df9403b6b55323cf2c56417caa52493ccef073ef3dbf94281fda33147d3b6101bb8b96cc9383899fdbcb6c74435a9a02c47f0212a4f8
-
SSDEEP
1536:ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZCl/5v:NdseIOMEZEyFjEOFqTiQmYl/5v
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2484 omsecor.exe 1832 omsecor.exe 3860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3612 wrote to memory of 2484 3612 0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe 83 PID 3612 wrote to memory of 2484 3612 0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe 83 PID 3612 wrote to memory of 2484 3612 0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe 83 PID 2484 wrote to memory of 1832 2484 omsecor.exe 101 PID 2484 wrote to memory of 1832 2484 omsecor.exe 101 PID 2484 wrote to memory of 1832 2484 omsecor.exe 101 PID 1832 wrote to memory of 3860 1832 omsecor.exe 102 PID 1832 wrote to memory of 3860 1832 omsecor.exe 102 PID 1832 wrote to memory of 3860 1832 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe"C:\Users\Admin\AppData\Local\Temp\0ebc48f140e7a5592edc30985957af8713d3597df962beddfff33bf52bee35b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5b97364711582bb2291f647de9b40573a
SHA1552a67c9f3fe1b1ecc884a52a9b84b8ddeef6fd6
SHA25686e907a106449ddf67a09078eaa90b31edb9634bfe8628e5e2d66961242cbc85
SHA5121b4616160fbf63db3880c126d3c69ce6cb2c05e5813112e28da26ce0e727fa58634607a8bedbc3b24dfaaa44675df4dea008917c5b5e29581ca76715828f25c4
-
Filesize
61KB
MD5d069dbb2f4c452f4baccbde3cb3360e3
SHA156beebe557c4d273e07bc67c65084da352bc4a26
SHA256ffa5cc20dab7c598a3fa664c3f543d0a9b454d974c20dfc8df715e5e1a186bed
SHA5125765da60fd1b1b4d36d64d34abcef777c662ae3930125e2fc164b395ed5b5debcb03ca4285d6b460a906c577204cd6c062028325077f8c878767ae7307d731a3
-
Filesize
61KB
MD5f9cd044b825d631e6d669d8fca6c6ea6
SHA1400b1e34adbe5fff7db07ee735dcd6c10899cbbf
SHA256d55d6376311883d460aed5e668a400b0c540ad00421141dcf9da70b62413ab10
SHA5127e44e189c37e1cc700160358df96b74759bc5561fbadda654e55dd002b0b9049c749fb973814234c98392a68d55091d9d1911f1a8981acfa2ecee73fcb77f0eb