Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 11:24
Behavioral task
behavioral1
Sample
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
Resource
win7-20240708-en
General
-
Target
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe
-
Size
61KB
-
MD5
d0eb853b69cbcc4757456263156bc1bb
-
SHA1
a44d4894b5cfe87d99e51e8ce72b825a1aa5416f
-
SHA256
b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294
-
SHA512
c0ae41557d1af1ca13e70deb8443c706697200fb6f22b74411fa4dd967f4de07e222b39daa8ac39bd603e888046979a0c9bdef76649d724313879f91dd81f5d6
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5/:FdseIOMEZEyFjEOFqTiQmTl/5/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1608 omsecor.exe 948 omsecor.exe 1208 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1608 4048 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 83 PID 4048 wrote to memory of 1608 4048 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 83 PID 4048 wrote to memory of 1608 4048 b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe 83 PID 1608 wrote to memory of 948 1608 omsecor.exe 101 PID 1608 wrote to memory of 948 1608 omsecor.exe 101 PID 1608 wrote to memory of 948 1608 omsecor.exe 101 PID 948 wrote to memory of 1208 948 omsecor.exe 102 PID 948 wrote to memory of 1208 948 omsecor.exe 102 PID 948 wrote to memory of 1208 948 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"C:\Users\Admin\AppData\Local\Temp\b597cccb15a4ba56a304c2bbce11d9d94f22753039293e35c8e3ed0526282294.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD59b513a43d52d39c4a6b133778cf111aa
SHA18912a2ad56f5067e0926e42b24fc5e81b4b12643
SHA256bb709705c1a7b2447dc6e456ab29226ab8ec4e5092aa41f2a0c1b425f029c3c9
SHA512a696ea820168a0b427108ec1330638caf8c7733bac483c8bbd934a33ceb36a7aeabc59c7b3d97e4680c8425117910bc16df495208518929f5522468dc794931b
-
Filesize
61KB
MD5114f04a76fdf1790cc0dcf292208f93b
SHA1da241e00c7012357d2f22275aeae36dcb6e381b9
SHA256353c9bfd920a7dda81a14888b00b4ef38829d7e03545bc509377d7c37382f3e3
SHA512a952ec18d3cb534af274c71de72871b3494c8237a5fbffe5a3a847373866620547c016a282530bcc6d4cb1fd14f6e25df5abb2468512319f7b78fb9357ece700
-
Filesize
61KB
MD5cf20db172feaac6b595f0c50958cdbae
SHA1fb392eee7096c84d46a932b55decee14b13c92b7
SHA2560d78ac603b7b027cf8256a2286f0a20125d647d79fbbb91fef23b9e481429240
SHA5124620fcf251d4c9a995d4825bf1b894e324c605f8aa3da1e261d6db899bfa0528a04c4716f369a82e8cb952ab5aaa0e3c07a9e48f3bf7df7065a9cc7dfe7bbad0