Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 22:38
Behavioral task
behavioral1
Sample
5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe
Resource
win7-20240903-en
General
-
Target
5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe
-
Size
90KB
-
MD5
9b25c1f85a6513af8ed1b13d6016eb3f
-
SHA1
d4206f9739fabf88b8d62af447a1f7e7bee7e59e
-
SHA256
5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb
-
SHA512
503d887daaa2fb19e91938ce7404fa1ff3f7b61db909c3e186787a2ef859ec0794cc09aa0ffafba6c7af7585912547278f85b6022d00f20ded7bd3ccf8f59d6e
-
SSDEEP
768:SMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA:SbIvYvZEyFKF6N4aS5AQmZTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4516 omsecor.exe 4348 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5056 wrote to memory of 4516 5056 5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe 82 PID 5056 wrote to memory of 4516 5056 5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe 82 PID 5056 wrote to memory of 4516 5056 5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe 82 PID 4516 wrote to memory of 4348 4516 omsecor.exe 91 PID 4516 wrote to memory of 4348 4516 omsecor.exe 91 PID 4516 wrote to memory of 4348 4516 omsecor.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe"C:\Users\Admin\AppData\Local\Temp\5158cec155da041a20a1050931383d979c09b20d99b675ec8937bc608bd804fb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5af5f13407c10c09639b0f455c43c83b5
SHA139595fc06b40f10fac25eb20f0e1ab9ddde74325
SHA2563b593407ceb0db84fca0d7937d647dcd3dafcdc408887d4eed4a7244e48f5c2a
SHA512678562c438c7b76bc08dd94d0824dcc8648cc8e27ae7e3ac770e1a64d4c6502975042e4063cb80b719c0b58f72f7c373c2bcd68bb914c26d7e15b53fe7070517
-
Filesize
90KB
MD5ee2c8ceaf4adc9cf8e8eb41b85c76847
SHA121f8efd56ed69fbb9904e3f498ff4f9a3f24e009
SHA256b50eb016400396e75728569b6033be00102e751bf2a4bea41245df87f80d331e
SHA5128d839bd1817dbb1767df2d13c89470b0557c6c1cc95044454bd04bd116125f0b9e5ee7a3489f579f72e988f1559a8cb06a4750bc94f30bd4abda61da81fc3189