Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 13:43
Static task
static1
Behavioral task
behavioral1
Sample
be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe
Resource
win7-20240903-en
General
-
Target
be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe
-
Size
33KB
-
MD5
89cf0cba306fcc16afb21f84a5a9f7c0
-
SHA1
4cf3747e5e2388305b5cf740cbc3fe3ddbe73c5c
-
SHA256
be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66
-
SHA512
b3744ce8c59d4db32192cc0904b22715b8ff6c4534b12a186dadecf41ffa2fcabea05b447f504d9b88d79cf19d7c19f47e21e353e3b00eb5fb3f8f6f5052ba92
-
SSDEEP
768:FfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:FfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4296 omsecor.exe 3312 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4296 1428 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 83 PID 1428 wrote to memory of 4296 1428 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 83 PID 1428 wrote to memory of 4296 1428 be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe 83 PID 4296 wrote to memory of 3312 4296 omsecor.exe 101 PID 4296 wrote to memory of 3312 4296 omsecor.exe 101 PID 4296 wrote to memory of 3312 4296 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe"C:\Users\Admin\AppData\Local\Temp\be6c6a8425c78f95f9cc483137fa9a52e18d3457f31a380c65adce720744bc66N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3312
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD526ae0504bf448d1cb207017dfbc2a2cf
SHA157b0343cc107fe91f9116f0f52a8f02d594e8a9b
SHA25674b5bdce8e12262caa948cc1a65653491056c4979e7f726f8747929d2819a7f4
SHA512b606b0e2b4bbeeb7f78f48d68c20cf6b3e7de1c2741ab2aaf41fa3abbb543324bff12e721a92b07fa6c664a0007e7302ab59cc8adedd365a76cd91e666d5a678
-
Filesize
33KB
MD51de0b6da53ecb5f95f92a72b7bcbc0b7
SHA19d99a77329e209a7ed04c877c69b1463d9d92db9
SHA2569719dc1d7ee95f937900a10dc41cc8ea5a82081285b8552872dbf338d61e2423
SHA5124d59039fb3e01bbd8bb524e5aa6cf8022fee18af87eeeaf1bc4e8e0c781801b784b1e639f33dfcd025ee7f6ceb2e0d87613010d69ce1b97b7ff85ce3b1e7f6f2