Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 09:13
Behavioral task
behavioral1
Sample
b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe
Resource
win7-20240903-en
General
-
Target
b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe
-
Size
76KB
-
MD5
54671b1978545adcabcd1af11ee404fc
-
SHA1
509ad6c0bcaae5b039072de1901573ebdb593afd
-
SHA256
b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4
-
SHA512
dec6d7c69fc5edad231c81f3a94cef5fc36725ddf0ae6d2b40500aab6d9ffa377bec85b72520303b378818c4b34586a22c4db8586e47d1231fbcffde4fbaf780
-
SSDEEP
768:KMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWr:KbIvYvZEyFKF6N4yS+AQmZTl/5Or
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2696 omsecor.exe 4284 omsecor.exe 216 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2696 1644 b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe 83 PID 1644 wrote to memory of 2696 1644 b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe 83 PID 1644 wrote to memory of 2696 1644 b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe 83 PID 2696 wrote to memory of 4284 2696 omsecor.exe 100 PID 2696 wrote to memory of 4284 2696 omsecor.exe 100 PID 2696 wrote to memory of 4284 2696 omsecor.exe 100 PID 4284 wrote to memory of 216 4284 omsecor.exe 101 PID 4284 wrote to memory of 216 4284 omsecor.exe 101 PID 4284 wrote to memory of 216 4284 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe"C:\Users\Admin\AppData\Local\Temp\b9812e755a69b3af67d692ba4d2cfe5c6c9bd114ae8d892e03dd90d5e6463dc4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD584be90bdf56204c00770e860298186ba
SHA12f494485d6ebdb53bb492c478d5343b43145dbf5
SHA256c6f20c8cf773cd2e2441d2269c1e5c4f22d10c41adc15a9f942c35093f162130
SHA51227e781bd3e7710ca4e45498100b3bfbecc9260870e092bb08fe0a16502ab119e02182ef4da64bc4e58b8c263ca38f0b3f050f7621edb258533705022d780fc50
-
Filesize
76KB
MD5fb69375e151864010137492993111414
SHA1e739d54c8bfc82648c733e804b911d2a75a0b311
SHA2564240db1f62eae917fa92609a65faa918436e66f946128817e63831a8c586bfd8
SHA51279cb437a7016f7b9ba905ab1355c419fd5fe0f7faec85ae8e2518bc3b6927a2a4158e242978173be82cb45e24c2ab2eeac38e850811e90920a848609b7ca5e34
-
Filesize
76KB
MD590cc93139ef12cdb838c713c78708386
SHA1ad1ed499397e8f1da7163fd92ee897d781fa0f7b
SHA256014a6339c5cd4643501e5d1bfac011cbcd4c3d872a045b0f756430c955ecb7c6
SHA51226cb199e0ebc6a16d26481d0afa6bbe3f62e72c451e156a3c4fdb79d7dde38e941b7fe4b8be0ed7de0ea7649146270f34ae7046afe9c84ef717eb034d897856e