Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 21:24
Behavioral task
behavioral1
Sample
25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe
Resource
win7-20240903-en
General
-
Target
25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe
-
Size
71KB
-
MD5
e3e2b715ff511fbbd1319f4d9be1b785
-
SHA1
f1ca8fd66c392b948dea7821426f49b573d221ac
-
SHA256
25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f
-
SHA512
2e3ea75048665116096378c6c3b629e1a26d068f60ae6d60e86ad81b33ec5aa5c5e2958249d049e320e59c3b2b32f7949b3f83fe874d5f30fd079e2b16dda754
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHP:idseIOMEZEyFjEOFqTiQmQDHIbHP
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3032 omsecor.exe 1548 omsecor.exe 2244 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3032 2116 25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe 82 PID 2116 wrote to memory of 3032 2116 25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe 82 PID 2116 wrote to memory of 3032 2116 25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe 82 PID 3032 wrote to memory of 1548 3032 omsecor.exe 92 PID 3032 wrote to memory of 1548 3032 omsecor.exe 92 PID 3032 wrote to memory of 1548 3032 omsecor.exe 92 PID 1548 wrote to memory of 2244 1548 omsecor.exe 93 PID 1548 wrote to memory of 2244 1548 omsecor.exe 93 PID 1548 wrote to memory of 2244 1548 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe"C:\Users\Admin\AppData\Local\Temp\25c92a82923530fa591ecc1d616f734d2d9cdf316e0eba9f5077b3751edad16f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5bbef9b23693ef8ca1060dde15ff0b5c4
SHA17b2c6f0aa9922fb4f38db12f24a4d0eb7592cc6a
SHA256ffd64392ba306e54ae2bfc64e25897cd7d5002a949123f48ee280f2800267952
SHA512cd19008bdc73f687f7b30e3bdd5d9d5a3cf0e4e866d7f1d05eec3cff4442da115c41692c47921c73ad612a6dee2b1256dc2b84c262d7152a76458948cd182969
-
Filesize
71KB
MD5a4a546865c15275cd7650dc69e579dcc
SHA16ae6d3db60b3b832fa0ce809eddb1a1a0ed26591
SHA2568a63ea7898973bc3cbf3e1d6af5a461fd16568d620fd64528c0a6e10e26c2643
SHA51248b373235e7c5e6f6993554d37fa94bfdc8a96181e8b56ca980924be900a78d395810b27cb3b7ee94c3353701dd63d3b59fdfc8fa2618a5db1221c594171facf
-
Filesize
71KB
MD57d5ea4513d42f9faf5ab8c4051a97348
SHA1c44fb01f819d711512e151443c51c2c5a726d959
SHA2562b465564074250371dbb3342da7bf9f5c4ed346b15618bde2796e4f39991236b
SHA51210957a11333b349e8b32d8e2a89e86c634a0a05f1abcff1b0745944e0b27de4cba8737fff7b5175db1f489c1b3fe42ba27b935aa8183b949806a33c7ee2a8cc1