Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 14:56
Behavioral task
behavioral1
Sample
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
Resource
win7-20240708-en
General
-
Target
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe
-
Size
72KB
-
MD5
875b37b1081e4e898456c8cdb9d500fe
-
SHA1
388d7d3a4dba9115741a5f107fcc48471508573f
-
SHA256
0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0
-
SHA512
496489eee7710b0adfedd489d90cc3157fa5001bc9d3c71f7283bdeb11919e8e2f1bc2fc1c312af39f449375bcdd8418475b1c4e6dc190a4cc753e76ed25b78a
-
SSDEEP
1536:Bd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211X:xdseIOMEZEyFjEOFqTiQm5l/5211X
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1428 omsecor.exe 1912 omsecor.exe 960 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1752 wrote to memory of 1428 1752 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 84 PID 1752 wrote to memory of 1428 1752 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 84 PID 1752 wrote to memory of 1428 1752 0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe 84 PID 1428 wrote to memory of 1912 1428 omsecor.exe 102 PID 1428 wrote to memory of 1912 1428 omsecor.exe 102 PID 1428 wrote to memory of 1912 1428 omsecor.exe 102 PID 1912 wrote to memory of 960 1912 omsecor.exe 103 PID 1912 wrote to memory of 960 1912 omsecor.exe 103 PID 1912 wrote to memory of 960 1912 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"C:\Users\Admin\AppData\Local\Temp\0e7143ad7a887add41c3451bd07bb258059b12ee24b00fdb5abc6deb513106d0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:960
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5527878658f651d7ce2683b77650d4105
SHA1ee357e3d4ddbb656bf715733792cd8ae335c3dfc
SHA256956a7fb8348d281d3f2b2a90b1c52e8c1cd5cc04f6a053dcf68b4ee4fcb577b8
SHA512d7ed503e7258b4af5f0b2733724c4588fd43677c203a86071d6749db868ac4dd4de4d700717c7a9ddfd10313ac1fd97e2736679a59ee88a34b846f72d51296bc
-
Filesize
72KB
MD59beb25be2eb8a2890632a1dec901a6c4
SHA11eee417a92708f84d85fd115274676200532ac86
SHA25628899e1637cf9cf155308ad9a94f67564d22ca4585928b8613d100dc71d2808d
SHA51239e546262f1be5affb2d9c45fd35457c3b11a2c296be42f7c94a48b104b4be477f63f11a54fb6c7fa9aa3bcb47ee7bc17a37a0e2f5b9a5854aa5ce92ca1b2903
-
Filesize
72KB
MD52349c2347ef752235d186f3d4a1e7fad
SHA1c4380d4230a186b3b9e363aa176a486280096362
SHA2568d50b283fdaa0af3beaa26e6c753967a80156ae0f8c0bb3de793d6d450031791
SHA512c690d93167fb6d3935a914e2ca82cb852865d125bb268b4e897cbd0538f43df8847d1c302bc3cca7f5638c347bebc9d2cd3fe2fe8f492ee7c011042b5c8d7dbe