Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 11:20
Behavioral task
behavioral1
Sample
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
Resource
win7-20241010-en
General
-
Target
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
-
Size
61KB
-
MD5
d0eb853b69cbcc4757456263156bc1bb
-
SHA1
a44d4894b5cfe87d99e51e8ce72b825a1aa5416f
-
SHA256
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294
-
SHA512
c0ae41557d1af1ca13e70deb8443c706697200fb6f22b74411fa4dd967f4de07e222b39daa8ac39bd603e888046979a0c9bdef76649d724313879f91dd81f5d6
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5/:FdseIOMEZEyFjEOFqTiQmTl/5/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2412 omsecor.exe 3392 omsecor.exe 3984 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4452 wrote to memory of 2412 4452 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 83 PID 4452 wrote to memory of 2412 4452 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 83 PID 4452 wrote to memory of 2412 4452 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 83 PID 2412 wrote to memory of 3392 2412 omsecor.exe 101 PID 2412 wrote to memory of 3392 2412 omsecor.exe 101 PID 2412 wrote to memory of 3392 2412 omsecor.exe 101 PID 3392 wrote to memory of 3984 3392 omsecor.exe 102 PID 3392 wrote to memory of 3984 3392 omsecor.exe 102 PID 3392 wrote to memory of 3984 3392 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD551819aade06a32a0994a9a933584cfe0
SHA1caa98cc11771064341fc38712af4b83cf47938f6
SHA256a52f51b49a5dec1c18d5f8a2bd22facf009efa16a79e8a7eb0c5efe7fa05ef3a
SHA5127fd1af4f579d3da546535f869432acf5e50e611070e3865ff66cd726e02ea438532a2dfa668345c769f6128a5f656d485c8505fceb4fd39a5c4021a1a7efa6f8
-
Filesize
61KB
MD5114f04a76fdf1790cc0dcf292208f93b
SHA1da241e00c7012357d2f22275aeae36dcb6e381b9
SHA256353c9bfd920a7dda81a14888b00b4ef38829d7e03545bc509377d7c37382f3e3
SHA512a952ec18d3cb534af274c71de72871b3494c8237a5fbffe5a3a847373866620547c016a282530bcc6d4cb1fd14f6e25df5abb2468512319f7b78fb9357ece700
-
Filesize
61KB
MD59383b32ca4759262cef390588373ae13
SHA1a4fc41fe3a3377189a0d6c0cadec3e0a910f8359
SHA256c5f83861c9eb19bb19413028124acf3491dd26aaac6d019958869d70c895b4a3
SHA512c08005e00f3e3b832a795b08ee29e49fb9944ab71d3756b7582b5ab54db010d7aea2e7ff02d5234b2d09cf658d9e35f3d067a6dde58d180c795d806bc301fc55