Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 07:58
Behavioral task
behavioral1
Sample
db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe
Resource
win7-20240708-en
General
-
Target
db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe
-
Size
61KB
-
MD5
d376f8fb586d399cbc7fbcea97191c40
-
SHA1
54d2dc2fd119b41138f1c458312bcc73a4965bd7
-
SHA256
db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3
-
SHA512
fab8a20ab385249b6102cd3b009bfdaf44753374e7959e292ab237229f1575b3b6f086bf2e1d12030e3ec4f70f564cd47fa5ca478c9674546943b89c534e6f34
-
SSDEEP
1536:Md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZil/5:0dseIOMEZEyFjEOFqTiQmcl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3020 omsecor.exe 928 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5032 wrote to memory of 3020 5032 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 83 PID 5032 wrote to memory of 3020 5032 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 83 PID 5032 wrote to memory of 3020 5032 db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe 83 PID 3020 wrote to memory of 928 3020 omsecor.exe 100 PID 3020 wrote to memory of 928 3020 omsecor.exe 100 PID 3020 wrote to memory of 928 3020 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe"C:\Users\Admin\AppData\Local\Temp\db0803d803353feb68a9b86994a4904c32d61291757625bb7d855b5ac053fef3N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD543fc0258dc27d2060ff6ae68a7e4c288
SHA10552ee7c63602c18d708da07b6f6f18f5f4be62a
SHA256fc0e1d8129229c8456ca973085b39492253f3379d7a59d831fc3ad83de51df54
SHA512c0c2e42452a667dc4e0231797e3593b17ce99f5bb9d7817af460c18788883756d50d2d971b9387d2013d37e32f753f19763afb25f2f95f2886cf89b311a9ab26
-
Filesize
61KB
MD56a44811cacdbf8e5c827be0f6f58067f
SHA1daa91549d738dde486139c0a56d8e4f81985d4ef
SHA25661c299934dddc78922e08cb73936c02f7c243641b6715c485a90014d84ab52c7
SHA5121651900ba706d8e4bc04121922ec113c2bb6b02141df70965f1ed284c85547711d5f3e308316e0691c731e444e8afd397ac2841dd90e3e6387e2327acea43d44