Analysis
-
max time kernel
115s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 14:47
Behavioral task
behavioral1
Sample
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
Resource
win7-20241023-en
General
-
Target
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
-
Size
72KB
-
MD5
875b37b1081e4e898456c8cdb9d500fe
-
SHA1
388d7d3a4dba9115741a5f107fcc48471508573f
-
SHA256
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0
-
SHA512
496489eee7710b0adfedd489d90cc3157fa5001bc9d3c71f7283bdeb11919e8e2f1bc2fc1c312af39f449375bcdd8418475b1c4e6dc190a4cc753e76ed25b78a
-
SSDEEP
1536:Bd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211X:xdseIOMEZEyFjEOFqTiQm5l/5211X
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1344 omsecor.exe 3232 omsecor.exe 984 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2872 wrote to memory of 1344 2872 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 83 PID 2872 wrote to memory of 1344 2872 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 83 PID 2872 wrote to memory of 1344 2872 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 83 PID 1344 wrote to memory of 3232 1344 omsecor.exe 100 PID 1344 wrote to memory of 3232 1344 omsecor.exe 100 PID 1344 wrote to memory of 3232 1344 omsecor.exe 100 PID 3232 wrote to memory of 984 3232 omsecor.exe 101 PID 3232 wrote to memory of 984 3232 omsecor.exe 101 PID 3232 wrote to memory of 984 3232 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD537888ec7418c4be945c6583052da4649
SHA11027b7ecd886044398427feffe48adb7755c2937
SHA256e7efefbb106ae94647cb9fae45bbacf278881b9ca0ff7e0eafbbbf8c824ed2a6
SHA5122ebfa232a3e78ae3719703ba6ed65d3cde64e19de589c1409ae489eeb3bc9911cf53d112a0442dc644bacb62dc0a027ebd9c03b952d148c882cb115790aac3b4
-
Filesize
72KB
MD59beb25be2eb8a2890632a1dec901a6c4
SHA11eee417a92708f84d85fd115274676200532ac86
SHA25628899e1637cf9cf155308ad9a94f67564d22ca4585928b8613d100dc71d2808d
SHA51239e546262f1be5affb2d9c45fd35457c3b11a2c296be42f7c94a48b104b4be477f63f11a54fb6c7fa9aa3bcb47ee7bc17a37a0e2f5b9a5854aa5ce92ca1b2903
-
Filesize
72KB
MD50730d871333c367fa94991cb3f16033f
SHA19914d17b89a69c38c6fb6b0a1492a6bcd06ae931
SHA256400e276c3011747d89de26572634ff4983b9077709aeab137e8cf09a67d06749
SHA5122a0a5140212663a6230ffc880ed3391cee8410caaea447e197bef47aed4580dfe2907cf096d3115abac928170a67e7c92ef291f2745b2e6bb36b946c1538ddef