Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 11:03
Behavioral task
behavioral1
Sample
8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe
Resource
win7-20240708-en
General
-
Target
8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe
-
Size
88KB
-
MD5
3aec4f04e9758e3fbb80b9f774907185
-
SHA1
13ba3a484de505ebe27e7fdfdce5f9c36451288b
-
SHA256
8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28
-
SHA512
2ddca3cd6e9af6d0bf7e9a718107191aefa3e13088f5b243c396033efcdf4331912f6c31a3f37fef87faa053a0df4adc4d5e04aac3b176b39b4d6a967dd52c32
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5r:edseIOMEZEyFjEOFqTiQm5l/5r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1564 omsecor.exe 3436 omsecor.exe 2064 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3856 wrote to memory of 1564 3856 8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe 83 PID 3856 wrote to memory of 1564 3856 8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe 83 PID 3856 wrote to memory of 1564 3856 8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe 83 PID 1564 wrote to memory of 3436 1564 omsecor.exe 100 PID 1564 wrote to memory of 3436 1564 omsecor.exe 100 PID 1564 wrote to memory of 3436 1564 omsecor.exe 100 PID 3436 wrote to memory of 2064 3436 omsecor.exe 101 PID 3436 wrote to memory of 2064 3436 omsecor.exe 101 PID 3436 wrote to memory of 2064 3436 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe"C:\Users\Admin\AppData\Local\Temp\8bbf4cd485a5d6a2c3d17d88495bbf81392a9f60241d7c4cf8502688b5841c28.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e669587171138acd3def66d9e0b61883
SHA1346d0c65fde15bb27a743009aec9a73dd6469d38
SHA2561ffaa96bb006a7966e7a9a2e6013560d9fdd45aa17acd8f19446c10a03e59724
SHA512e5bf3f9619b472393c96c73a374cd4d0245c5987579bed6d2f515efec673661dfaec2c01876fcb6c10a1a67b641c1ad0e9c534fb2ba81b79c0176f73beeb929c
-
Filesize
88KB
MD52a7b543e4d9d99723e4ed24394be9bb2
SHA1b3dc39e31f102e7ab0383c4d319231acd3431abe
SHA256b320cfb86fd1c6c9078f7df25ad456fa9b27ac8b519aabe868bb01549105e260
SHA51277f50415515327ff5eedfbd24928274ff3bbe3c9e0ab9597f1aae77032071701396e21d488372b36384cc7f22b769a37708097e001b5ead3ead7860e4917e0cd
-
Filesize
88KB
MD59ae221edb2efc59ca5a74205c8c260a7
SHA178bf85616b40ec7b6fda70ba28d65e121607d186
SHA2568bf88d2cc7c10748fe5e682bbbdf1eb7556542429c5734c71c6802c08e152fd3
SHA512fe93801ccc186ecb62a79e0ed767cf73f5f2165bd4d20f3f6d53f88e228b6cce22c08520717b418d24fa6fa583fa465fecb297b868607a7bc8943bbe79b7366c