Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 01:57
Behavioral task
behavioral1
Sample
7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe
Resource
win7-20240903-en
General
-
Target
7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe
-
Size
76KB
-
MD5
56080554397ca8fb2f5a16c333bfeb76
-
SHA1
9864307dfc7a84e8a6d45dc742f2cd6415bbb34d
-
SHA256
7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a
-
SHA512
27189da3101a4b1ee18a0609c713b159e0b558d2229603ac23eea698f89cd77369b67c20003a5edf1680cfecb64388c24b74657c3c4d36af3a80cfdf628782cd
-
SSDEEP
1536:ed9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11L:GdseIOMEZEyFjEOFqaiQm5l/5w11L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3444 omsecor.exe 2832 omsecor.exe 4028 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1976 wrote to memory of 3444 1976 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 83 PID 1976 wrote to memory of 3444 1976 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 83 PID 1976 wrote to memory of 3444 1976 7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe 83 PID 3444 wrote to memory of 2832 3444 omsecor.exe 101 PID 3444 wrote to memory of 2832 3444 omsecor.exe 101 PID 3444 wrote to memory of 2832 3444 omsecor.exe 101 PID 2832 wrote to memory of 4028 2832 omsecor.exe 102 PID 2832 wrote to memory of 4028 2832 omsecor.exe 102 PID 2832 wrote to memory of 4028 2832 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe"C:\Users\Admin\AppData\Local\Temp\7b5d185be23630ee667b35b00d898bed834b0f0a170b7f11157145f7e030818a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5256d29cda0188c5bf6b875791f283543
SHA1438374d69070c0d8d952ab0052fa97770e4d9a47
SHA25650b6f3e2e20c5f33c94e2fd43c96b0edf9f246665e173f094bd8760b2593e1e1
SHA5125cd7ab1d39a63ee787a72508decf93435c3667d8002c1fea61646a4927a99727adc7e5d9ce6f1b62f92208eb9665358127aab4af1ca42885f309bfc81adde576
-
Filesize
76KB
MD5deceb37af32a28fe04e1bf078e291318
SHA1e90d0b18ff525b25d1dc762183437811fdb71432
SHA256db2518a0afd1ce1ac8a7f28a8bc9464c8f319f8205ed1f36846ea1c97422ac5f
SHA512c00899b183bfc9f16e2024861786ca73b78336f37d4088ca63c7b0f57e934b6703898b636656ecfc3b0ce4c85adc73298b34deb325c4ec11b24b6bc06ed08bf5
-
Filesize
76KB
MD5e7a95fcc42ead312dd7e4ef038b418c0
SHA16de6e6bb5e3dcbe6e457c3e5a5d2f236628410a9
SHA256957eb81d2eac276cc3b41f38010551b2750b46466719b19893cdfe517ac93b04
SHA512876710a5c6e516089339ef88b55b28a16afd6deda778695f1bda0a7b937da70dcc42c496d346cadb4d37d48f2f2d2caadc6a1ed8110c1cf2aeef70ccd6ba6ef2