Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 23:03
Behavioral task
behavioral1
Sample
315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe
Resource
win7-20241023-en
General
-
Target
315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe
-
Size
80KB
-
MD5
4cac4da6513b2494ea90fea579d6c2a8
-
SHA1
0edede44656cabc718bc91805f135563d7b6f452
-
SHA256
315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d
-
SHA512
ec0d57d1baa87dde2cbfa37472dc961980691a278d147f005544e2cfaab710a633fdf01a1f65b169ff06f7faa74a2038343434ff43d23e0259cef5d8abf42144
-
SSDEEP
1536:Wd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:udseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 988 omsecor.exe 4456 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2640 wrote to memory of 988 2640 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 82 PID 2640 wrote to memory of 988 2640 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 82 PID 2640 wrote to memory of 988 2640 315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe 82 PID 988 wrote to memory of 4456 988 omsecor.exe 92 PID 988 wrote to memory of 4456 988 omsecor.exe 92 PID 988 wrote to memory of 4456 988 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe"C:\Users\Admin\AppData\Local\Temp\315953fbb913441159adea85d6d5139b8f633d99b26e28d76b4db2618f69a11d.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5829f0322839e78ded1df12fe0335527f
SHA17877c149c9ff6792cd4c0cfbbfaf4897dc72a465
SHA25621f4612a0adb5307edac6542ed828a6a0b5b76b41ced4bd74f1a9fa914a5822a
SHA512add7189d16d66391416348569ef232761c44ee9bcf81a58f52e944d0dbbb38f937a9a0d9213deddfda27616c3f160d4dac64a9cc1d5dc783581feb45c27676cd
-
Filesize
80KB
MD56a7203ffde26b9a88c59ddad7ad468ff
SHA11d7cc99173bee4e0058b87651e175f62ae2bbf38
SHA256d0f02cd468f1990920725aff3ab24a68801502387c326608a13cee22b8d4908b
SHA512f5d6634ae10da7bbf85d9eb289c5ec45d4992a9b401d8c6f89cd0ac8c5a7b1899bc47fa6f647ad49d2d810333f1e744fc98af8d01f9b24465a57fb55909674ca