Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 06:56
Behavioral task
behavioral1
Sample
f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe
Resource
win7-20240729-en
General
-
Target
f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe
-
Size
64KB
-
MD5
faa1f0708a24f1248f743e820a405109
-
SHA1
a412e6fab7fb4dcdb7f5d8c2994649380056e7a0
-
SHA256
f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a
-
SHA512
261f2f1c3982146fbef8e58b7cc0bd507af25e70f40bc3cb382f8f161d3409d17d10ebb742dc7e5c1a95482273cf7843af92f11ac5c7c739254f1e2732d3d9e8
-
SSDEEP
768:KMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:KbIvYvZEyFKF6N4yS+AQmZcl/51
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2164 omsecor.exe 2640 omsecor.exe 3536 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1980 wrote to memory of 2164 1980 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 82 PID 1980 wrote to memory of 2164 1980 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 82 PID 1980 wrote to memory of 2164 1980 f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe 82 PID 2164 wrote to memory of 2640 2164 omsecor.exe 92 PID 2164 wrote to memory of 2640 2164 omsecor.exe 92 PID 2164 wrote to memory of 2640 2164 omsecor.exe 92 PID 2640 wrote to memory of 3536 2640 omsecor.exe 93 PID 2640 wrote to memory of 3536 2640 omsecor.exe 93 PID 2640 wrote to memory of 3536 2640 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe"C:\Users\Admin\AppData\Local\Temp\f5b1ea19507d9dfbbac7555162dbb673fb3e6506e6775f8a9c90de0b20bb895a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5625eb9e9591fe89a4d812aa273ac0526
SHA1064326593768af61a8c60298c2f78023937f9195
SHA2563bebdeb8b34cf94df486ac386f849b8e3ae7dd4d8ff3bf0a87c11391d04c9fed
SHA512279cef2e1505ab000f94c3efe5c8c3faaecec70382b493e904d7c926c8385c956a0450751fba782a24cecbd000d841501d6041f084b58e0f977d1192332f2e1f
-
Filesize
64KB
MD51c347f2656a9aa3867ecb159f99856d4
SHA13d88ae5cbb444b98c515e00507cd3d2063d42d51
SHA25648e8a3f4939995f5ff2fc1fa5a8e2ba03897d0fff924f28c51ed3d55a07b98a9
SHA51292e832605d20876945463d924a993eabae5aa9a74f2816bf71949466ceae2013f09c50ec3808e79943ef7a3c2b7ed81e7155c8377b3e62885c73cb652a9f080c
-
Filesize
64KB
MD52742448914fe4557cd99513186197c69
SHA1ea9500949d1e063b27256fc6218c92eb30524453
SHA2563f0b282aabaa7d2cc353d97d84d1a61473ecbadd9cbcb6e3e6a09895eb8d1ab0
SHA512d08b47a244e6e2f325d088491c8722f7df484ae58bc121e7f58ae87110307ea35543d367d2a8d5519af92e86df197ef4ee4498fe31b2a563e409f7a3a5f97de5