Analysis
-
max time kernel
115s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 02:15
Behavioral task
behavioral1
Sample
51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe
Resource
win7-20240903-en
General
-
Target
51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe
-
Size
76KB
-
MD5
ac6aaaabc173bd895004e09a05dafd90
-
SHA1
7c347e6d13b37e1f416e8770beb5da59a06c66fe
-
SHA256
51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26
-
SHA512
0efcda78a2ccecee99b1a2fc5033e1e0c69774b64ed222feb8b9003ee5b60b3e808764924a8be0d9fbee887001273ced6467199e696408ea7fc136b0ba3f7be6
-
SSDEEP
768:fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAW:fbIvYvZEyFKF6N4yS+AQmZTl/5O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2232 omsecor.exe 3280 omsecor.exe 2724 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4484 wrote to memory of 2232 4484 51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe 83 PID 4484 wrote to memory of 2232 4484 51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe 83 PID 4484 wrote to memory of 2232 4484 51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe 83 PID 2232 wrote to memory of 3280 2232 omsecor.exe 103 PID 2232 wrote to memory of 3280 2232 omsecor.exe 103 PID 2232 wrote to memory of 3280 2232 omsecor.exe 103 PID 3280 wrote to memory of 2724 3280 omsecor.exe 104 PID 3280 wrote to memory of 2724 3280 omsecor.exe 104 PID 3280 wrote to memory of 2724 3280 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe"C:\Users\Admin\AppData\Local\Temp\51029ec6fc57e258119fc773649dadb30137b64ef9b30ab11fdbeeff5383de26N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD524ef689911ac240db41c4d85369bad62
SHA16fe0eb12cf4d8c22c297c2cf8fcd6f8ecd0a321b
SHA256d706ea1dc6097db4292c943f2be8ce2d2923ed432faafdcfa0527c51408176ea
SHA5121e641b3ae3706a01011e010e7172486fd5105dd8601de965e634792c14f638beb3dec58f87419a4bec8733a628d6dbdf1920ea74871a727d94c79b63dd9bb46b
-
Filesize
76KB
MD52ef2a73393a3289b040e98d1cc5efa71
SHA1e65bbda415c1b48dbe17c26557fe4a3ac30fbb97
SHA25631dbad8c7e2f0efb2bea039974105bc5ad3fe3a6e3eca5f94a3341a6bab9ec23
SHA512b9e3ffbd945704730bdd0591b0ef1768964213e5adb9d0a548ec27ed06f1fd87519fe6161c98fe903b4d5a4131d4b4cc7be3cf5598260088c4610dca663e1207
-
Filesize
76KB
MD576d4bacabcd7c2d268f2490bd578e080
SHA13c8de345947d3ae459a38e0adb95352eb5e968f1
SHA2564a455350b2eeab050dc66f4b00897b0107e0170e598e8b118f2a566ae7fab4b1
SHA51269ad91718195817899e1c8d688ac6649986a2aa01257c6cc31a622cae107503ce3db4402c782e44546b4c99b6abcceb5aa7fe524bb38ed7c3e2e1336dbf83d2e