Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 15:59
Behavioral task
behavioral1
Sample
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe
Resource
win7-20240903-en
General
-
Target
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe
-
Size
64KB
-
MD5
73e5f0f01bf8368b8b82432b027610e5
-
SHA1
ecf068b47a2747e0ef0286c6f9d03f2f8aacfaa7
-
SHA256
7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f
-
SHA512
46d0172face375c9f10315a571080a1d6af155e4b7209eafb8caf5b90e9761219afeffa54eff935b5d915b009bfbfefe65bd4ee0c7f8207c21291d74f0726791
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:NbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3944 omsecor.exe 2612 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3944 4060 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 83 PID 4060 wrote to memory of 3944 4060 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 83 PID 4060 wrote to memory of 3944 4060 7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe 83 PID 3944 wrote to memory of 2612 3944 omsecor.exe 100 PID 3944 wrote to memory of 2612 3944 omsecor.exe 100 PID 3944 wrote to memory of 2612 3944 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe"C:\Users\Admin\AppData\Local\Temp\7a492eaf1df94ad3ffea031e184f81099ed752dce08e77aba9ed657ead97dc3f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59cb842ffda5cc91a433fd8c8655c0678
SHA19a94a3a65ade88a164e0d7ed451d26b7af41f6fb
SHA25699c4637bfd77d17ec3a9d8a7d95c65c8045720a083f6741776aa8147acf89c99
SHA512d24054996135b838e73c795a5fbdc1054d985e56e7c9743501d8f46af071292c98aef444733bbd07f9b08613fd92b3459453b0d648b0c037d94347f7d9075409
-
Filesize
64KB
MD583063f934a6f507333a2874553fe35dd
SHA146d6ae66b5b79865bca366ccc3c96dd35fa9b293
SHA2566dcfbb7df1d481301e312415f22d32f5d145cc0075300719f3b56c5a08110b57
SHA512a85ec95ff091adc329197eb9bd96c4a56c398a5d94989858fa6790530928e0daa8ee785b7868c3284dfc30cfb5fb0f90c4560360c6b2518f13e3e79cde0583b7