Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 01:20
Behavioral task
behavioral1
Sample
5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe
Resource
win7-20240729-en
General
-
Target
5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe
-
Size
90KB
-
MD5
62b3a09a071a8088a4126ecd348254f7
-
SHA1
e9f4a00b33b5e6b91299082d464334decda79944
-
SHA256
5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad
-
SHA512
2a09f39732224747721438bf4d5e2036aeb85e4133d7db643dcbc360c6ca65b6c117e102f26c3412f6f5e7127d8a56a0c183b5719dd06825fe58833b2f37e2cc
-
SSDEEP
768:2MEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:2bIvYvZEyFKF6N4aS5AQmZTl/5G
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2456 omsecor.exe 1460 omsecor.exe 2400 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 684 wrote to memory of 2456 684 5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe 84 PID 684 wrote to memory of 2456 684 5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe 84 PID 684 wrote to memory of 2456 684 5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe 84 PID 2456 wrote to memory of 1460 2456 omsecor.exe 102 PID 2456 wrote to memory of 1460 2456 omsecor.exe 102 PID 2456 wrote to memory of 1460 2456 omsecor.exe 102 PID 1460 wrote to memory of 2400 1460 omsecor.exe 103 PID 1460 wrote to memory of 2400 1460 omsecor.exe 103 PID 1460 wrote to memory of 2400 1460 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe"C:\Users\Admin\AppData\Local\Temp\5779c7f9227ccfa608fa0977fdc1d383888f639c757b8ca02684fc4ba4aebaad.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD565efd2902d60f12317de93e5bc024f67
SHA1b2a72487c3c546f9449a12012fca91b99e6f7898
SHA256539a55dcfc85a0914867622ca7b6ee79338d0a1105ae1d7267d8a345de21acef
SHA512a3797f4175cc295d6aee0f3579a292824613c86d69f9eacaff7fc49581802d19a89c2597d92c619f3b7cc50f06e7bca0da740525f65e5956c73795bf50b5a6b1
-
Filesize
90KB
MD5c8e99543794cb8b16b2c7a8f8c93e5b0
SHA17edf14b7178e2da719ea797b1ba39b5d0d5559b3
SHA256a12d1a55dd0024184c19335b617ec0ac46dfed68a712f3f1076b16d3c11ab73d
SHA512edac828172fd9f58058ac40f199a6ff200bb785a29231fe25b0ab45eb7bfabe6f9d00fbec82ec97e433ecb1a8a7031099063b7e142f9a1e5e913d5bf75fc9e72
-
Filesize
90KB
MD5cb01b42f5cf58dbbe625f2579392ad02
SHA1319d6651f423fdc321ed62124bfe083c7a77245b
SHA2568b1ea586ef259551c88239a1795bcaa848f2a4cf859fa5e1bf08cfb4d6d28139
SHA5127a416ec70dca765778aed3fbf6c0b987fcf7d79403535af6fad4a3f141199d36724b5f2ab19970d4b8e8ff34fa2bc1dcb79404a604fc39122eab4865e315461e