Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 06:00
Behavioral task
behavioral1
Sample
23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe
Resource
win7-20240729-en
General
-
Target
23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe
-
Size
80KB
-
MD5
ddd89d6efef5086643807602e3759680
-
SHA1
d443699e56adf2b3d34a8aabd7caddc31f639004
-
SHA256
23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3
-
SHA512
dd7203a90aa27942f9b4e43363d154d634519f586ce276c1b2cc7a29cbd0ecf9e6972703a8396497a517363e63514e54b9067966f56074f046ce5cba921c51bd
-
SSDEEP
768:GfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA6:GfbIvYvZEyFKF6N4yS+AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3284 omsecor.exe 4828 omsecor.exe 4636 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3408 wrote to memory of 3284 3408 23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe 83 PID 3408 wrote to memory of 3284 3408 23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe 83 PID 3408 wrote to memory of 3284 3408 23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe 83 PID 3284 wrote to memory of 4828 3284 omsecor.exe 100 PID 3284 wrote to memory of 4828 3284 omsecor.exe 100 PID 3284 wrote to memory of 4828 3284 omsecor.exe 100 PID 4828 wrote to memory of 4636 4828 omsecor.exe 101 PID 4828 wrote to memory of 4636 4828 omsecor.exe 101 PID 4828 wrote to memory of 4636 4828 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe"C:\Users\Admin\AppData\Local\Temp\23fb8519c5a239eb0868dfaba0df8939df777e81e44dc73d00852401a0c5e7d3N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD584e4fd4358a6a8f82eaa5c47f291ecab
SHA17a0f25941604fe935f3ec4800b2f4523bf8a445c
SHA25654fb0c5fa22e4638c8c66159b90c72566d4852837526050a173e11087bad48ec
SHA5124330211781fba11b3a9fb563dd3aaabf527d44ea5a4ba485191798a0969efc8c1c120ea4b3957dde3a2660e63372ddf0d56852dc5669f391c1af62a5d46ddece
-
Filesize
80KB
MD5b009c7b972cafdaf4a80932f8d48d61e
SHA1355ae7be58eb4724b12a0d5dd7fb05a8d4925c16
SHA256aa3b3aa27d832c051f7945c01371c7424a8f24ddd0a76ab4399b029ef5565902
SHA512011bb90d0d147726811631250303b8b7e166816f5db0f5573fa2ac53dd2a0f315f4a68098a6bf9c6d10b15637dd05c90e84d9b4cf163df6a1bafcb50c2093fbb
-
Filesize
80KB
MD58ab5060f0790f9be577424b331157909
SHA1246a7657ec95eb8abfb7f25af0589438a61f076a
SHA256a68d11ee2e84baa47c422bee4fb315e0b5e384fe4eef751a2927687d55ad58af
SHA512f8d5cdf6b1c842c333f8f4ea6887999789eda41057cc298095a6635eb7e0ffbe2c6431df2c385bbd1d0fdb94fb48f38548b49383c85c0e63140ddf5199c56ff0