Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 00:17
Behavioral task
behavioral1
Sample
a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe
Resource
win7-20240708-en
General
-
Target
a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe
-
Size
90KB
-
MD5
e70979f2cb5eb8e7e410b87a94f5af0b
-
SHA1
51669cacbd1c41b01b99e4bd68f4df34f3747ffe
-
SHA256
a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9
-
SHA512
3dd587df70334707211afe5a5038893971f656ced03a0853366c167c82528522b922a0dd9918df5648f885698ba97efc0e045f39a11883b4f94d0f160a1b17a8
-
SSDEEP
768:+MEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:+bIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4472 omsecor.exe 4984 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4472 4444 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 83 PID 4444 wrote to memory of 4472 4444 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 83 PID 4444 wrote to memory of 4472 4444 a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe 83 PID 4472 wrote to memory of 4984 4472 omsecor.exe 100 PID 4472 wrote to memory of 4984 4472 omsecor.exe 100 PID 4472 wrote to memory of 4984 4472 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe"C:\Users\Admin\AppData\Local\Temp\a7dd0737bb980e9eed5c06dd9c66e28943fa4e38495c833a7b3241f5c2e603b9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5e7d9f64a32cea5f699a2f92e029e259b
SHA12a19a9b580167988eab0eaeea25f69c3f7c2fd9f
SHA256c93385637ac2e36361be2dcbf8bba832d3b60cf2d45a6fa3e1a3a3ea77897a12
SHA512aa078325c751d07d9caef3e2fcc613bae018f3aef14b15d99ee6a07130e03d6f188fee1400ddd98607c5dd0783823252a2db790971d59ddd8b2c8d708ab5ff8c
-
Filesize
90KB
MD5c179d4b333419ae066ef3867c26e0e5f
SHA1be831114fc38a992818ab9a64c128398cbd31387
SHA2568a9d335646b9e2858e5734264acf13865597f18696ac071c721a7cece6803acc
SHA512d714223fb0f83f5c5b3834e1e63285192818853892d6fd2eb06a72d38ed1adfa34fe0a5fd83e9b85231631e622b25f759b578218ae720419f6b30ba1a2bcdcc0