Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 11:32
Behavioral task
behavioral1
Sample
50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe
Resource
win7-20241010-en
General
-
Target
50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe
-
Size
62KB
-
MD5
017b49c92d7ec1e7c1bb7aa42eec5c60
-
SHA1
67e3748765cf29abbefc1321a77d0d3fb8cebb56
-
SHA256
50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784
-
SHA512
27c60a8303017ac2e69700ded48d2763561b0fef8b3fd7740912a26938d3608ff9e36c619115453dbe1cdb7057445a7fe448fb50c071712e89fc3a6643f5e227
-
SSDEEP
768:IMEIvFGvZEr8LFK0ic46N47eSdYAHwmZQp6JXXlaa5uAf:IbIvYvZEyFKF6N4yS+AQmZtl/53
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1364 omsecor.exe 2720 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3548 wrote to memory of 1364 3548 50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe 83 PID 3548 wrote to memory of 1364 3548 50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe 83 PID 3548 wrote to memory of 1364 3548 50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe 83 PID 1364 wrote to memory of 2720 1364 omsecor.exe 102 PID 1364 wrote to memory of 2720 1364 omsecor.exe 102 PID 1364 wrote to memory of 2720 1364 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe"C:\Users\Admin\AppData\Local\Temp\50362cf04080e9edcfbcded73d520bd5daa0413d7dc0cb95dfab6391f2507784N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5d7960ca7b8bb39549b78c8eb7c70f080
SHA15ff4d290bf1c1fa4d2a8d4210a81f7e9d5a88d5f
SHA2563b342401d36f19b1591f04d22b53e30dac961e8d8dea9f69dcbf8d4512e51524
SHA5125a114edf261cf61d1b376144b4907b8e42e7b215ad9ce6f35388a57a3669f8e5e06a9a4ff81e9f83f56713a353ea4634045363137689dfca2e3b4228a949573a
-
Filesize
62KB
MD5396e41cf7f3061b736d0674eab7172e4
SHA14489d24a7deef3bd91cf6a3584672b08398a6163
SHA256cba4ebf1b1e15ba4e1514ed4680de4cbfe16536e8ab9e1f48e9eb5e7c9c54bad
SHA512973024c00513d1401692061b293f74cd9a43e643f875dfd22d8ab114d0f59ac880e422c93a0f963640c345631e0737ce5ef7b00ca2dfb9becf74e57750f6776a