Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 14:13
Behavioral task
behavioral1
Sample
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
Resource
win7-20240903-en
General
-
Target
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe
-
Size
61KB
-
MD5
f8078bfc32acd72e6a1dd0792addff28
-
SHA1
76201c74a5273413c26c717faef17e8495a34b44
-
SHA256
69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38
-
SHA512
e2bae942352907b158b1a0b4605d5621b17666ef0c8b5ce8bd90cfe583c229d90dd5c1bed8dbb07a52f018a53b92514768b499f97429f303ed0a679d2e1b1517
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZnql/5P:LdseIOMEZEyFjEOFqTiQmFql/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2596 omsecor.exe 2356 omsecor.exe 1944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4936 wrote to memory of 2596 4936 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 83 PID 4936 wrote to memory of 2596 4936 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 83 PID 4936 wrote to memory of 2596 4936 69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe 83 PID 2596 wrote to memory of 2356 2596 omsecor.exe 101 PID 2596 wrote to memory of 2356 2596 omsecor.exe 101 PID 2596 wrote to memory of 2356 2596 omsecor.exe 101 PID 2356 wrote to memory of 1944 2356 omsecor.exe 102 PID 2356 wrote to memory of 1944 2356 omsecor.exe 102 PID 2356 wrote to memory of 1944 2356 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"C:\Users\Admin\AppData\Local\Temp\69f57ab257422931e637838d5222b5270320febff314ac5efb311e1c4e0dee38.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD540307e203cdc70b2ece42db1e5299b81
SHA1c5f9f16eba2dda561cb744474835da4a65db9470
SHA25629c8e00c9b76a8c994587085b2a25d6ba992122ab904990bbf05369f56eef7b2
SHA512026e79b57c92f279f118cf6cb2e500083f73d1fd789b072c0ebd1b02a197829bb5812c35842a2fadd57396320227df3c5ae5902c564c99a26323f16bb47f17eb
-
Filesize
61KB
MD50a4c4e946602c24bb4e6e3e24b6faf52
SHA16d36a7f7ef071bf64aa54b95746eeecc659c4a99
SHA256035b09e844bc78016a34f0788275d21144175fd144ebf84b140643139fe59416
SHA5128acd6e9fcdc69390e9fcb8ddd5ec6d9902b90d63d072cf98c66a3a7054c79f5b5cee31a517472e827d263d6a1feb2687fdfb3bbb2f7f3616d06f0ab70de6b450
-
Filesize
61KB
MD585ad766f590ec43cd0c987d7c24f1575
SHA1e56386835183803837c8a604c626153c9c9c7b24
SHA2561115e76016f20ec44e7d2ed3d550b229c2b266044bf16680b3b7e88ed868b1b2
SHA5127aa56358b9a1b501569fc9d34f9770abc32ed9547c493a7b87f5eb739014af9212f0c5792760655228f7a7e22fba91d66eeec5a59c600efff822facb451e8119