Analysis
-
max time kernel
114s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 14:09
Behavioral task
behavioral1
Sample
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
Resource
win7-20240903-en
General
-
Target
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
-
Size
61KB
-
MD5
f8078bfc32acd72e6a1dd0792addff28
-
SHA1
76201c74a5273413c26c717faef17e8495a34b44
-
SHA256
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38
-
SHA512
e2bae942352907b158b1a0b4605d5621b17666ef0c8b5ce8bd90cfe583c229d90dd5c1bed8dbb07a52f018a53b92514768b499f97429f303ed0a679d2e1b1517
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5P:LdseIOMEZEyFjEOFqTiQmFql/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4512 omsecor.exe 3660 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3644 wrote to memory of 4512 3644 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 82 PID 3644 wrote to memory of 4512 3644 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 82 PID 3644 wrote to memory of 4512 3644 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 82 PID 4512 wrote to memory of 3660 4512 omsecor.exe 92 PID 4512 wrote to memory of 3660 4512 omsecor.exe 92 PID 4512 wrote to memory of 3660 4512 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD50a4c4e946602c24bb4e6e3e24b6faf52
SHA16d36a7f7ef071bf64aa54b95746eeecc659c4a99
SHA256035b09e844bc78016a34f0788275d21144175fd144ebf84b140643139fe59416
SHA5128acd6e9fcdc69390e9fcb8ddd5ec6d9902b90d63d072cf98c66a3a7054c79f5b5cee31a517472e827d263d6a1feb2687fdfb3bbb2f7f3616d06f0ab70de6b450
-
Filesize
61KB
MD524fb952effae7a5a8873e8e9cc1b0d7d
SHA12d5ab9130c62ab009148d8d40a73dfc89ecbafaa
SHA256cd99a4233c5d40f4ee13b91e249a2b406278063097f5b5602523d5ca9083805f
SHA51268d016c4f793836d6f75f8e6b14b41e2ad4932577b3eb3e90ab5ae6d7b10c936741289d5743abec4359de46787afc059d16fa3afc8919974e2619f06bf906eb9