Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 22:46
Behavioral task
behavioral1
Sample
503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe
Resource
win7-20240903-en
General
-
Target
503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe
-
Size
61KB
-
MD5
5b59fdfc3f93c3b1fd2be24f2632d44a
-
SHA1
54af018f546775e794ae404397ecd91b8e840d73
-
SHA256
503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f
-
SHA512
d9af13bd153563ea0281d549cc2b63445d2d0fa20054b2ce8680ec861702a6ca5fda8c8a6424f907005871c295875a947df0ee0767a0e2744b542e35f2573eb1
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5n:cdseIOMEZEyFjEOFqTiQmcl/5n
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1660 omsecor.exe 5088 omsecor.exe 2912 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1660 2656 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 83 PID 2656 wrote to memory of 1660 2656 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 83 PID 2656 wrote to memory of 1660 2656 503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe 83 PID 1660 wrote to memory of 5088 1660 omsecor.exe 102 PID 1660 wrote to memory of 5088 1660 omsecor.exe 102 PID 1660 wrote to memory of 5088 1660 omsecor.exe 102 PID 5088 wrote to memory of 2912 5088 omsecor.exe 103 PID 5088 wrote to memory of 2912 5088 omsecor.exe 103 PID 5088 wrote to memory of 2912 5088 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe"C:\Users\Admin\AppData\Local\Temp\503b14de51486ba69830a6f42f2b8f569da016caf857f8d16fc3dcddf14ce98f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD579fbc75d3e0f47de4e931507d785239a
SHA1b1906edea646581e8b358032e63c1eb54a541ad6
SHA2563601ebb8493127d06845909d76443ee10e5c5aedfbb6792b1d6a7c74ea553626
SHA512cf2a9a2cc7264632717f3d220841561a7ba36aea73cf49c12651b418da96174333be534e6f6008a9b2786b1cf22e2530ba4795ddce6573808054b01afae6f1f9
-
Filesize
61KB
MD57713f1899de3e4305d00795506b0b033
SHA1ff9d2ba4fc6afe3200dcd6d5b7572bee16de8b49
SHA256985036d325c077910c1e1d6681eb813936e04b6f465f11686ace0b18baaf3ce2
SHA512b713ba4b098774b751a093198ac3a2c402748314f8b02ca3566b87081b3ac71f5e9ea5fabba70dd8e1adfbc5e49011ae28eea4138edf5b497ec1c1ae51c53996
-
Filesize
61KB
MD5dc282de4971cccc2e9dc6053476c62f8
SHA1ae0b3b5c8a006d929bf802ad4ede8233d57ee5b3
SHA2564aaae93f4a548cd632e3a874966f26423c01aae260b9a3c835ea850a424f4b11
SHA512a6e061c57d6952a6fd47312b36b7fd863e7dd787dee79c3ef8fab34107cd8b1b4a768c839dddfe977279c0c4b4dcc27f216b43d4364073accefcf4b9e4cbe208