Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 05:57
Behavioral task
behavioral1
Sample
fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe
Resource
win7-20240903-en
General
-
Target
fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe
-
Size
35KB
-
MD5
d1b2f0800332562c2195324c89ce7964
-
SHA1
9d1444a323871a58367f9eedcc8bb2e2131c4dfd
-
SHA256
fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a
-
SHA512
0bce2b4a89c3ede2e1c29c97f9fa0527e73968b6fa54dfdf2bf3d319d76669f50f065888def2bdaf6db818764341a782d1d32cd3c52f7b6d9e9632df34df3e8b
-
SSDEEP
768:w6vjVmakOElpmAsUA7DJHrhto2OsgwAPTUrpiEe7HpBn:H8Z0kA7FHlO2OwOTUtKjpBn
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1484 omsecor.exe 1176 omsecor.exe 2320 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
resource yara_rule behavioral2/memory/1728-0-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000c000000023b2c-3.dat upx behavioral2/memory/1484-4-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1728-6-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1484-7-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1484-10-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1484-13-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1484-14-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x0002000000021f51-17.dat upx behavioral2/memory/1176-18-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1484-21-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/files/0x000c000000023b2c-24.dat upx behavioral2/memory/2320-26-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/1176-25-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2320-28-0x0000000000400000-0x000000000042D000-memory.dmp upx behavioral2/memory/2320-31-0x0000000000400000-0x000000000042D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1484 1728 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 81 PID 1728 wrote to memory of 1484 1728 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 81 PID 1728 wrote to memory of 1484 1728 fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe 81 PID 1484 wrote to memory of 1176 1484 omsecor.exe 91 PID 1484 wrote to memory of 1176 1484 omsecor.exe 91 PID 1484 wrote to memory of 1176 1484 omsecor.exe 91 PID 1176 wrote to memory of 2320 1176 omsecor.exe 92 PID 1176 wrote to memory of 2320 1176 omsecor.exe 92 PID 1176 wrote to memory of 2320 1176 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe"C:\Users\Admin\AppData\Local\Temp\fb91f8ade4066c6077a528f4a36c380333de811846ef8e4aef492b6f6ccfce2a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD59a59e0532909979274044b1a98d481b6
SHA167198aba7228be1b17add53535e78fe2cad42fe9
SHA256581dc28763fc1458865070796c7f34d752d7a6bdb530adeef48fe5cd18e588b1
SHA5122125fe689c6fe5469e9f753b17e89c11d9c1efba5f83771b85d142424c3899af1dc47c809305d9edc1f50f980a822ee7ce51dbd210c73035c8364d528e5f7e6c
-
Filesize
35KB
MD5ce67b8b9896af06c19b0d88066d17f82
SHA1a9128745417cb73af5816e2a073e577790a4e393
SHA2561c44fdd67eafe6a4cdf825e44e613d82f1ae15ddb88d4f94b42cb5a5f3102773
SHA512824eb7369b6013466f3bfcd472644dedb360afab8427c2471ddbf689a54d5eb82e9f21c909dccfe18d6d315df517f32141d1cb68d6c575caca856e0af4a5d5d2
-
Filesize
35KB
MD5311ea6efb05bac0851124861596255fc
SHA10740d341b85de823322194cdbcf8304c75f9bd2f
SHA2564ddffa02e530d08acdd5a05a521d966fe9d8ce9746ecc8a9206ca2bc9464ad47
SHA51266f2f0260d987bc86d891ee0013163ae80e56bdacc580a46d20c993caf29dad289d9de3985d44b108913ab52aae69a819c007d25e5b742c6bba8febf7d351d60