Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 22:09
Behavioral task
behavioral1
Sample
8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe
Resource
win7-20240903-en
General
-
Target
8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe
-
Size
90KB
-
MD5
927c632d19cf1a09d6e9d2b053042f28
-
SHA1
cdbe7a141f9e59ebb085601a0c675fde8322aadc
-
SHA256
8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba
-
SHA512
06ae5c1ae5bc5c91b306252a44bd41ced3b366b845d3836cc789b35df00fad0988338d8116cac3b03d8e93eeb9731e1d8fe3a0911d86a7f15979f35c7c930a90
-
SSDEEP
768:9MEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAK:9bIvYvZEyFKF6N4aS5AQmZTl/5y
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3420 omsecor.exe 4452 omsecor.exe 228 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 720 wrote to memory of 3420 720 8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe 83 PID 720 wrote to memory of 3420 720 8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe 83 PID 720 wrote to memory of 3420 720 8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe 83 PID 3420 wrote to memory of 4452 3420 omsecor.exe 100 PID 3420 wrote to memory of 4452 3420 omsecor.exe 100 PID 3420 wrote to memory of 4452 3420 omsecor.exe 100 PID 4452 wrote to memory of 228 4452 omsecor.exe 101 PID 4452 wrote to memory of 228 4452 omsecor.exe 101 PID 4452 wrote to memory of 228 4452 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe"C:\Users\Admin\AppData\Local\Temp\8098437110388791f3582d804176f5ee71bbcbe08c686943a7e77c719dfa43ba.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD543952b7e2e1826aec624feb3efc15174
SHA1f03cc0b65f6816fb9c3a7a9a648a740c4bf21af7
SHA256d94ac588ea6047c7f35b2c2581683b92f4b720862de577c61579d635949a0993
SHA5123b2d16826718ad96073025f0a6184004cd7e9bcef9a13071ee494b157797086e47bafafbb8e5c873b246fe597cd0af576650cfa56275cf37c040d8dabb01d9e9
-
Filesize
90KB
MD5a7c053a1ffd4cf604e65a6857f1ef898
SHA13400ca8ea261d9b51e08492fff0add5f0c430870
SHA25673cdb56cd63bac31a71430f9c68d46f41ec09c1854dfa154d8cb3a5dbc986d07
SHA5123b6070bfd4cd34163592774a89ea6c2e55b4beaeef58af72480b981de477dc546c14f420fe7d4ace521ccc9df3c5112866e60a08b605862d8d475068305cc72d
-
Filesize
90KB
MD5c562feaa70bd0b3eaa5e4f72cb669442
SHA17d66eaece852e01467296964aa50c794b5f0be3a
SHA2568ae99e668362da6d1ee31b60b34b8389e4949e19d14555feb70dadabedb1774d
SHA512357a1d6ee4a141c75ece81a934d9873e11992c2de86d8f946ef4ecba5e6a5cfd6479024cd7d68d4fe3eea2ce685a4c1bf6a63b362360fe2fcfec9b8349c55ab2