Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 23:38
Behavioral task
behavioral1
Sample
143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe
Resource
win7-20240903-en
General
-
Target
143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe
-
Size
35KB
-
MD5
5652599febc626acdf447b183c0dca30
-
SHA1
1be7bbe1eb908704eaa1b8540740904be7842c0f
-
SHA256
143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1b
-
SHA512
b33ac534ac977837be737d90beb4a73aa240a223a33e9f365a9e60b5c559364f12c5b618a4d0794d6cb7f90c78518f0e51a96593e6f14e5ef9f2d45f6a4fe0d0
-
SSDEEP
768:K6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpB9:J8Z0kA7FHlO2OwOTUtKjpB9
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1604 omsecor.exe 2472 omsecor.exe 2660 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
resource yara_rule behavioral2/memory/824-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0009000000023c8f-4.dat upx behavioral2/memory/1604-5-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/824-6-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1604-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1604-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1604-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1604-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0002000000021f51-17.dat upx behavioral2/memory/2472-18-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1604-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0009000000023c8f-24.dat upx behavioral2/memory/2660-25-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2472-27-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2660-29-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 824 wrote to memory of 1604 824 143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe 82 PID 824 wrote to memory of 1604 824 143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe 82 PID 824 wrote to memory of 1604 824 143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe 82 PID 1604 wrote to memory of 2472 1604 omsecor.exe 92 PID 1604 wrote to memory of 2472 1604 omsecor.exe 92 PID 1604 wrote to memory of 2472 1604 omsecor.exe 92 PID 2472 wrote to memory of 2660 2472 omsecor.exe 93 PID 2472 wrote to memory of 2660 2472 omsecor.exe 93 PID 2472 wrote to memory of 2660 2472 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe"C:\Users\Admin\AppData\Local\Temp\143020eb7c54cab3b7158a39100131aa7bbaf61620b720f4c6e1a7135a270d1bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5b6c2b84550c2756a186546087b662ea6
SHA18e7b6f0edd05b4cf78c28758ada3638ac7890095
SHA256db5d28650b4901e9d1d12b2073c72dbb69dbd1601de92c5eab644b977e573104
SHA51242df274e8e1bf05a7ed0a723d766d16a78e7c451a6dab12f8d4bc5b2d248d3d081f8eb57e8e269ac4e63d68658961a6f59429318ef89693ebc7f43225d5e3982
-
Filesize
35KB
MD56f360fa092978d45071223abf32936e0
SHA1a3b33663ceb6a31e062c94f68f9e4d56b1d54c19
SHA25632b845bcf59cdc06926715dfa32560b92f5eb92e894e8d2787be628aba7b4add
SHA5129b92373bd2e10776f83ae123cff8177d95db0d1c112f60b093e4fab3140b71aa312191ae6d18d622239913a2ebecbd26ba5d98eb33c14b5b9be77d2a50a41961
-
Filesize
35KB
MD54041fee3c1642bcf949a06aa85d9ceab
SHA1b274a92a3c94434f76c3362befff184609a825bb
SHA2567bf881fea5b1e25e96e9c3637aabd55aa9c15bb6eaa9e36b55f9a6bf69243ac9
SHA512cdafd13a45375f7003b02aaea776ac59723ff1884406c04dba351f8fdbf64ca9c59eb67d8595469c7d77dc771477161afbf57604c4e6effb02fe0b954706502a