Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 05:46
Behavioral task
behavioral1
Sample
9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe
Resource
win7-20241010-en
General
-
Target
9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe
-
Size
76KB
-
MD5
cc362707bc8eb2642f49f1b03245ec12
-
SHA1
d078abe613dc23825207e26bfbe80e1eb29c2d3d
-
SHA256
9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3
-
SHA512
9eb676790fe2aea972ac84c7fb79af8d2ca2670002ed7dcdb18ff941a9ace609be9dff7b73ddca9fccb1ac88d74b8b41819e0d0586a6c349ce46b7ce8e8a674f
-
SSDEEP
1536:Ed9dseIOcE93NIvYvZEyFhEEOF6N4yS+AQmZTl/5s11d:8dseIOKEZEyF6EOFqTiQm5l/5s11d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3168 omsecor.exe 2168 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3168 4764 9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe 82 PID 4764 wrote to memory of 3168 4764 9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe 82 PID 4764 wrote to memory of 3168 4764 9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe 82 PID 3168 wrote to memory of 2168 3168 omsecor.exe 101 PID 3168 wrote to memory of 2168 3168 omsecor.exe 101 PID 3168 wrote to memory of 2168 3168 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe"C:\Users\Admin\AppData\Local\Temp\9aacc085f338849f4ba8306fdb67b17b2d077fd315f3baf820d104de9bf0d0a3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD53582cba6e8b6f0aa563dbe5d33110b08
SHA1fd7906d1afe5e7207877c52562e27145c36d0d5d
SHA256e0a1e1e4ff754ed10baa78cf4418775e40e6a9c27350397a3af3a9202a49fab4
SHA5121068a89ec6a090c9c7f4175f3922485aff86ec9c47e7cf3c02d6b876a9bde6d73703853c9f92a34685cbb4ccec6c8e0e1630647ab59f5e59e5858637f8db3571
-
Filesize
76KB
MD54bc002465e225130fa90ff84742d7d40
SHA182b603e36acbb97f6cad0533e1fd3d2d1e66cd77
SHA25693b635f4333a0e0813158c6e7693a120289adbca9ab88f69cd7ad01180b140ac
SHA512619f435b5b8cc4596a65803be7db5671c87d785f9aeebbf7dfa48372257ec32f2765f7af800a72697c64a9199e98c6fc0bd6a81ad05569e9115566c5f3cbce84