Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 13:03
Behavioral task
behavioral1
Sample
3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe
Resource
win7-20240903-en
General
-
Target
3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe
-
Size
62KB
-
MD5
eaa1226ce080f627ae1b7970cc599080
-
SHA1
4e0888d098670f9401b809e4954252c322a0f6d0
-
SHA256
3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5
-
SHA512
efb215ad87f7886149ce81c944c42fdcb7faa1603821cb5f87416e769ae100feaacb083e69ca96a0791af9903b3ad142f48ae418a754e2af7c4388ea79959362
-
SSDEEP
768:oMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uA:obIvYvZEyFKF6N4yS+AQmZtl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4916 omsecor.exe 1404 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4916 2420 3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe 83 PID 2420 wrote to memory of 4916 2420 3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe 83 PID 2420 wrote to memory of 4916 2420 3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe 83 PID 4916 wrote to memory of 1404 4916 omsecor.exe 101 PID 4916 wrote to memory of 1404 4916 omsecor.exe 101 PID 4916 wrote to memory of 1404 4916 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe"C:\Users\Admin\AppData\Local\Temp\3bc1faead5289ca45c3205eedfcd4933727c606e20d340f24d511e6e69c4fdd5N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5ae21ab55abb72c96b2a8a9f102416bf3
SHA1ec7b84a113a49bfb9aa172b5d442fe13a323c579
SHA2567256a2e4fcc9d8cd9873dc8e4d19778760a80f6a57aeb4cf3fcb342bea3ae235
SHA5121c951291fa3f41f47ee0a097d1ed7cb588c5bdb04a4ec4b6421cff535ee2bd4e3ecc1607fcb0528588addc494ae6b18438e20aa1cf794bc0151406841709ccaa
-
Filesize
62KB
MD5f48ccfbad02d27b813d14dc97c68973a
SHA12437bff7ab9ab6f790c5f172543613023fb9a8d5
SHA256f49011e526ca7647a4f6d2057657d32ae852e09810059437d235329ce9dcbddc
SHA5129131cb58c8005d7676c29df42cea7e5600a8207ab128e8c4f481ed1e5a339ecb93751becc7b52ae779dd1965933b14d1e8051969871107d9f158a0439999c149