Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 21:35
Behavioral task
behavioral1
Sample
497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe
Resource
win7-20240903-en
General
-
Target
497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe
-
Size
35KB
-
MD5
aa613a8bd25bc214a676cac7f0abedff
-
SHA1
6bf050d95858ae02be396e8edf26087510d8d5f7
-
SHA256
497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54
-
SHA512
502873de7479dfc73e92076ec09299f3dfaad4f3e1fed373e85683c4bcdf0c78acd47ab3784a8e525b68cb5c2ec1c0f554ec202fa01436ed396f5746485ed517
-
SSDEEP
768:K6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpBn:J8Z0kA7FHlO2OwOTUtKjpBn
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3508 omsecor.exe 3076 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
resource yara_rule behavioral2/memory/2468-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000a000000023c4e-3.dat upx behavioral2/memory/3508-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2468-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3508-8-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3508-11-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3508-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3508-15-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0002000000021f51-18.dat upx behavioral2/memory/3076-19-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3508-20-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/3076-22-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2468 wrote to memory of 3508 2468 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 82 PID 2468 wrote to memory of 3508 2468 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 82 PID 2468 wrote to memory of 3508 2468 497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe 82 PID 3508 wrote to memory of 3076 3508 omsecor.exe 92 PID 3508 wrote to memory of 3076 3508 omsecor.exe 92 PID 3508 wrote to memory of 3076 3508 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe"C:\Users\Admin\AppData\Local\Temp\497ae3f0b585777ba8fdca027c8f55b8700fffd6695a73bb681030d323d1fb54.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5a2a8b433f154ec907b871802954cdf9d
SHA1711eb454c28ef70d18f21209a32adb6d24c526d1
SHA256b88e1f8df529f7d06247de2d5cfe6cc8b09ac4994cc5fe35426f4bd91a47bd2c
SHA51289ceb115c95a0602c2b2da54555110bce7f238a07021833a21e1325b42e86f0d356453d7e7dedf998c003e7b11375b9bd165fb419cdae295fbb7440c370b8bd8
-
Filesize
35KB
MD57295f69d00f4fbdd2c7a8f1b494fccc8
SHA172bc64a880f65239e36d478821d44b0b591990ca
SHA256099c2dec094c7a04f807f550f8930854534ff991f32bdfe10d83209597fcd501
SHA512095eaedf1c8946213c48f6823cfc75d1823d143ffbe0c3e7d70ff836108d9d0ca76ff72c866127238ee45150e5543eb1a2183070e93c15edf301c193dbfb417a