Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 02:47
Behavioral task
behavioral1
Sample
9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe
Resource
win7-20240903-en
General
-
Target
9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe
-
Size
88KB
-
MD5
8711594e145da589ed6e749628a02440
-
SHA1
81972941e5cc4d0eb97fdfcac6e300545f68786f
-
SHA256
9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0b
-
SHA512
9408076bf2001750e83b02e6af100dc681d194acb0eb98dcecb5d38618ad77f3c20bae2ae791630c60d229c3122e0cf6ff49b2a10c6102efaf6cf15c233e805e
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5R:edseIOMEZEyFjEOFqTiQm5l/5R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3108 omsecor.exe 3156 omsecor.exe 3192 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3560 wrote to memory of 3108 3560 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 83 PID 3560 wrote to memory of 3108 3560 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 83 PID 3560 wrote to memory of 3108 3560 9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe 83 PID 3108 wrote to memory of 3156 3108 omsecor.exe 101 PID 3108 wrote to memory of 3156 3108 omsecor.exe 101 PID 3108 wrote to memory of 3156 3108 omsecor.exe 101 PID 3156 wrote to memory of 3192 3156 omsecor.exe 102 PID 3156 wrote to memory of 3192 3156 omsecor.exe 102 PID 3156 wrote to memory of 3192 3156 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe"C:\Users\Admin\AppData\Local\Temp\9e6244ca8f170f895710dafc6c1c133d21315e2ae53870a6e7485bed11817c0bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD51fadd5177395784048b7f14d40347bc6
SHA18e625f84f28385572a35ff0928f7aaf8208d12f7
SHA25678096b8adbb9e658a72edbe361fc70f716d94b2aa832dfb35768d5be5cbdb68c
SHA5129faf8da2e94089980a19ca5592340cfdb408b68f0df776838c2791fdaddd025b3e2c5f00142bc02178aeacff50d6258920047997a3914659ca6cda6a8974f32b
-
Filesize
88KB
MD58ba5a20c9f9f5cbf569709d4e5da8de7
SHA1e6800233dbedeba4c45163eacb9f90e4862759bd
SHA256c8f1a4f966d3d72c30d000cd306f298cf033558f794cbc014f3151eba81a84ee
SHA5128d906c0d710b1e4ebd7a229f4b0edcb27198559eeac2ea88f04b08166033e493c1517535a0f498045535b96a6a6ac07a3e4b76559ac6b250c543417e4c86ff36
-
Filesize
88KB
MD58c202645b06253ea86b9d987940d16a8
SHA10f66c103a8a5dc6384a7620c690b1c03f6f01905
SHA256b1447d253ce298e903994985020d2b5eec1acc11021280e6454db05e49889d41
SHA5124814e0283c4c09979cd469f773368dcfef8a0f26af72d6116e95145aaa560e78cc2ed30f527ef02d4bf6ea30e48b4dcd2149d3fae041835a578b8cbf13195b86