Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 04:50
Behavioral task
behavioral1
Sample
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
Resource
win7-20241010-en
General
-
Target
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe
-
Size
76KB
-
MD5
2b07ebed6c3cb422b0282d9e1a54037c
-
SHA1
6bde080396fdb0e8ac34a665519e6473b53fd964
-
SHA256
f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac
-
SHA512
9a4ff2373e5dbda86ac3ac7d0dd05871e39a85db039cdf8311a62c4784f67ea847ceea7c46278756050df03980539d752624494792fdc2ac351c0c620d422c1e
-
SSDEEP
768:gMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWr:gbIvYvZEyFKF6N4yS+AQmZTl/5Or
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1644 omsecor.exe 1628 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3432 wrote to memory of 1644 3432 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 83 PID 3432 wrote to memory of 1644 3432 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 83 PID 3432 wrote to memory of 1644 3432 f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe 83 PID 1644 wrote to memory of 1628 1644 omsecor.exe 101 PID 1644 wrote to memory of 1628 1644 omsecor.exe 101 PID 1644 wrote to memory of 1628 1644 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"C:\Users\Admin\AppData\Local\Temp\f578ed658552fdfd757091521b92afaf97b5f747e4b7de1d0782315b228744ac.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5ace68b1292f3c41f54e0154cdcdd82fc
SHA1e44b82bc2e4e06647cd9021a3d58de9b1b4f6882
SHA2565145786012d333510feeeb81c4c3115949a56e327a3eda440de6738665fd923e
SHA51289e01fe097fc2a7ccaef4f95e158f7e844f18982c09aa206a222f798e7458b41901ee2e4b7c02b1c1447079ed99f467eee8ce8cfac1839f699c818c78b4814d9
-
Filesize
76KB
MD57e3349637840fd154be186b8b0d55665
SHA177174ff43a2b2333b4a31fb744709262dbd84a80
SHA256a2b5eb33d5f5288fe23408bfaeb9f89f795a63dd481034fa377581391ac96080
SHA51211705310c4ba3353ab7c2e60f6c38b861aec022290b41c052a732f33a4a5d149f1e7da0fc6fc2831a1d1532057c10da2739185b6f644130554d999e7de3e9562