Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 00:55
Behavioral task
behavioral1
Sample
a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe
Resource
win7-20240903-en
General
-
Target
a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe
-
Size
90KB
-
MD5
89f7d3407cc5f0b826ed31c2dbefe9f7
-
SHA1
0eca596df03aaf5930f6547e8c0dc020f05744c2
-
SHA256
a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc
-
SHA512
62c0f3477cea169776875be3b76da64b32eed7cbe6505f1c8c97279cb8c086daa78aa4503dde5e8ed48415d53526331ee0e8da2fd503a1728a9e9982854d5864
-
SSDEEP
768:zMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:zbIvYvZEyFKF6N4aS5AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 920 omsecor.exe 1700 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3684 wrote to memory of 920 3684 a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe 83 PID 3684 wrote to memory of 920 3684 a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe 83 PID 3684 wrote to memory of 920 3684 a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe 83 PID 920 wrote to memory of 1700 920 omsecor.exe 101 PID 920 wrote to memory of 1700 920 omsecor.exe 101 PID 920 wrote to memory of 1700 920 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe"C:\Users\Admin\AppData\Local\Temp\a44643510b2fc410845cba4a876146540b99d1693a43758bff1d7438c0c6a1fc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD500cf57e2e25efe63de71c7bc1a6dfb89
SHA115615ed3cba1233cf243eb0a1c6773b0cfa37a05
SHA2565e22cadf3f62a340ce4931eb9bb1b5b23bfd0210d81b92ca1b6d72d2dacb1b2c
SHA512ff3bc27625775b83b3ad5dd3aecfc78d225227e89f600ecb5d419d50b998bd84a76b467898089cb5509c9727defffaf289bed606db43a4c984ca1130cbdf7240
-
Filesize
90KB
MD5f4f18e182c778551ea83359e3d22d8f9
SHA1d5b7c3edef8398cda352cee89077eae5f6c0fcdf
SHA2561edaae9007d366d50d09d4c68cce1b9832959a310aab33eef2df3d71540828b9
SHA51295140cdf18ed2f30b7d5df2e66a8568068575ff04013447b9fd4e48439d87632dbbde3a0e5fe3e2a6a7babfa63e96891cc5abd5530d596957e3a88a81edd23af