Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 01:15
Behavioral task
behavioral1
Sample
ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe
Resource
win7-20240903-en
General
-
Target
ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe
-
Size
64KB
-
MD5
9e0a955da113d1de1e82afdf2e8464df
-
SHA1
61b531f015149c0c82aafc96903ae3557e574e39
-
SHA256
ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009
-
SHA512
95d18bd2e1d650ec2d0eb13cd4ffd9bb291313599510663a1def54b06e1e7074a7a4ec090eb2ccf3e19e262219834bd74405e9be352c426cfbb1d92cfa34f5bf
-
SSDEEP
768:IMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uA:IbIvYvZEyFKF6N4yS+AQmZcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 5072 omsecor.exe 4340 omsecor.exe 4356 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1948 wrote to memory of 5072 1948 ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe 83 PID 1948 wrote to memory of 5072 1948 ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe 83 PID 1948 wrote to memory of 5072 1948 ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe 83 PID 5072 wrote to memory of 4340 5072 omsecor.exe 100 PID 5072 wrote to memory of 4340 5072 omsecor.exe 100 PID 5072 wrote to memory of 4340 5072 omsecor.exe 100 PID 4340 wrote to memory of 4356 4340 omsecor.exe 101 PID 4340 wrote to memory of 4356 4340 omsecor.exe 101 PID 4340 wrote to memory of 4356 4340 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe"C:\Users\Admin\AppData\Local\Temp\ab4ebe10c455386b14f644379fe6f4e91f73f9c41d247a7dfaee96051f692009.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b6fc7cce30a22667ba996806dd21976a
SHA1eacbe8773fe45f928e7d927d202b18e721bc0248
SHA2563e8885c33e18ced9bdbc6c66a0022cc8f212f5c4a766823afd7247cd8b320da7
SHA5124538c9476faf31a1cf4cc73f7bf059efdc2efd97d37a589ba1a092a4e70a7577ee8d8044863869257e06c425503e7ca9168bd93618ab27877c748891c6abadba
-
Filesize
64KB
MD58dfaa1ac6afe0c3e362c84e0f784f838
SHA13330427699525a1c3c3cc28e0b6fd3595605fd2a
SHA25642a9c55a3e355cc48eaff1993fb7ce430519f95a62c87d034579b275137c6297
SHA51296222cc43a27ff20a0aac7a7bffd4eb73bd2740739d03b77ff3bbbcc415a082de9512fd58122a3c80384f08a213a126abb4ac55b74c1723d993338f446573f97
-
Filesize
64KB
MD52f20e7816f11217cb0f47abd39233143
SHA10025b6ba14d362c9c949f9307f401dc63a996678
SHA2564d080d0652e6ed11f80b2c123245507b226e2126dafe7b1e7bdccfc485b86a5b
SHA512be42c288bde54ff88ce2f0713f8447b73383d02b3cab2a34ac82816441d92f3d9a81976d2e59f3905b47aff1d2602388d12ec2ee03ec69ec5f65230f5205d3b6