Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 12:18
Behavioral task
behavioral1
Sample
b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe
Resource
win7-20240708-en
General
-
Target
b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe
-
Size
90KB
-
MD5
7af9b5ceda1e9d155668a9e6008d3b59
-
SHA1
083e8c8c047248bfa49b0a74024f2564074ceef6
-
SHA256
b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674
-
SHA512
551147b5165da5a5f9312cdc7a45b57377fee556207ac393753e02178c8ec5c4bfa30a30d0f3559bb19fc0a664071ca377d0484ee792045eb8258c6e141bdfa9
-
SSDEEP
768:UMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA+:UbIvYvZEyFKF6N4aS5AQmZTl/5W
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 468 omsecor.exe 4468 omsecor.exe 3208 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4656 wrote to memory of 468 4656 b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe 83 PID 4656 wrote to memory of 468 4656 b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe 83 PID 4656 wrote to memory of 468 4656 b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe 83 PID 468 wrote to memory of 4468 468 omsecor.exe 101 PID 468 wrote to memory of 4468 468 omsecor.exe 101 PID 468 wrote to memory of 4468 468 omsecor.exe 101 PID 4468 wrote to memory of 3208 4468 omsecor.exe 102 PID 4468 wrote to memory of 3208 4468 omsecor.exe 102 PID 4468 wrote to memory of 3208 4468 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe"C:\Users\Admin\AppData\Local\Temp\b7e0fd4ea85be35f101afa84e8fa05112821dcffc32d0131cc203b368b5d5674.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD51b8b4f6d30b6991352daddcc67925a90
SHA1b646ddf45e24c0b995276d18117405dca887f738
SHA2560dd72a483722e2bd430248375555909349d24c92e83a119587da60ae70c8e34d
SHA512536fdbd07c225f90eef652107820aa89a11218a05ae0be27c321e841fd2e9ffeb7353f2e9e909284e046bbf33b87b38d9be976d0a9c61ec4211d1c996def1f27
-
Filesize
90KB
MD5af5bb426f8ee27bca4be5a96a0427f0f
SHA19700cdb94ed82c9d3606a517d396540fd0b4acc0
SHA256ff2c501d50c6da761d543af1848bee323059b2835609924e72aa10117b851d26
SHA512d36452c25ec4d183bcf04e7c9bede891da63cf846bdecd9ea8bb036a1dc36a0a08328e1e30afcdf496fdaad5ba430d42af96dd609efe9109a967ae38dd4ab781
-
Filesize
90KB
MD5bc7f0d8d7423d31119272182a72e7f09
SHA182cc872c170d62978d5f813d84eaf5407845c56d
SHA2564fd3e7edede6c8f8d1e5cd0b20603d797fccce3ea4e0ee996d626742f9f83333
SHA512b0773e688e51bac8ff9933e9b44901e9ccd725084122a856512e37385025c315c538a63bc78603c8ed9f5fdb6de97b51685ca6c1610cd0b222a98d92862a798d