Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 18:38
Behavioral task
behavioral1
Sample
1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe
Resource
win7-20240903-en
General
-
Target
1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe
-
Size
62KB
-
MD5
3dcdb2d1d4ba8dfb3a9d6fe0b1b20e75
-
SHA1
bd322d374d7ec59ce7994fefb808ab42e51ea521
-
SHA256
1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9
-
SHA512
5130d0939b8336d13173c97dd6720cc61d27d24ec5afc73fcb274c180843534052e09d30e4672753f8a8687fbde935ced8f6a961103bc4b6dd32c357aa673f93
-
SSDEEP
768:sMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uA9:sbIvYvZEyFKF6N4yS+AQmZtl/5l
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2520 omsecor.exe 3692 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4708 wrote to memory of 2520 4708 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 83 PID 4708 wrote to memory of 2520 4708 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 83 PID 4708 wrote to memory of 2520 4708 1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe 83 PID 2520 wrote to memory of 3692 2520 omsecor.exe 100 PID 2520 wrote to memory of 3692 2520 omsecor.exe 100 PID 2520 wrote to memory of 3692 2520 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe"C:\Users\Admin\AppData\Local\Temp\1bdfc8bc61ff3f0ddf6997276319dd8d087fd8ca6ede5fbb9d5637f4325868e9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD54b9c29f26ead3b6be3c2066dc511476d
SHA1a1cee8ddfaeeb934bc2c2ce6c2a268ca5254955b
SHA25602716db5021493b91fc436ae05ec3cbbba7586b646bcb6fc1b653b39efcaa7f8
SHA5120d2aa4950d09450ffaff88edbba451e41dd177205ffdca787bd5197fa47db2cd5706dc2901526642bd3cdc9ac99d5c60abf6bea0e5a583da91bbbdf88513002c
-
Filesize
62KB
MD52cdad16fde6d21cc593337c44e9e8f64
SHA1ac8bbf428c97c8af59861860a0cffdaacd859081
SHA256a4eff16e5dc01908791c94001d2048239e0ab34ff0d553dd49efe81f9e4db12c
SHA512e265effbe358b8775ffe29b522103b8ee48c338d9be7a725649d1b6000a9f844820e108779fffb9bc07c0da391b5da9445443de6e56c28c233aaefeafa169a1c