Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 22:05
Behavioral task
behavioral1
Sample
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe
Resource
win7-20240903-en
General
-
Target
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe
-
Size
88KB
-
MD5
f4fc90fbccd049176e76e4ac9470c4ce
-
SHA1
990e169ef96d575880fc9919dbd529a1bb418060
-
SHA256
6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9
-
SHA512
fb986df49e79a46e09af823ffdc2acdea4ec87d163372192183f0083b550e867ce366b910cc2ad4a2ac6f67a20e54595c27317ad133ae52ce71184d55646bdf7
-
SSDEEP
1536:od9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5R:YdseIOMEZEyFjEOFqTiQm5l/5R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2204 omsecor.exe 4856 omsecor.exe 2700 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1416 wrote to memory of 2204 1416 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 83 PID 1416 wrote to memory of 2204 1416 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 83 PID 1416 wrote to memory of 2204 1416 6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe 83 PID 2204 wrote to memory of 4856 2204 omsecor.exe 101 PID 2204 wrote to memory of 4856 2204 omsecor.exe 101 PID 2204 wrote to memory of 4856 2204 omsecor.exe 101 PID 4856 wrote to memory of 2700 4856 omsecor.exe 102 PID 4856 wrote to memory of 2700 4856 omsecor.exe 102 PID 4856 wrote to memory of 2700 4856 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe"C:\Users\Admin\AppData\Local\Temp\6ad1e780eaf23d117e9aac7400900fcf19f4fc83f8a64492a0e942886b143af9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5d889e669a8b91d3fa348aa51b3ca1e8a
SHA15d16531b630df38fe14d02be32eddf6b979e9434
SHA2564b15c49fb257b05b74761daa3c19595f2462518e96450f3de75aef8683af213a
SHA512eefbca050cdc27b98442e4c79008aacd390a985885acf483719c50d7d9e56aa1881cff9f0abb930658e40f342566d5e3e9d4da04e4f5d08890cc02b0942c943c
-
Filesize
88KB
MD548891af185479fc1f82a2a9f397a9760
SHA1ee0a085015948917b5aa163dafe85062d236335d
SHA256c1ed09c4504f234b83540c8002c5676bcd12a4723c2307a88328ff803086de6d
SHA5128e1b450a46d8333287f577840d0bc10317f82fe6bfe0875df0f76c3390615ce95eaa486ad21d83eb5847d09671971991100f5c17e84f4ba4641429dfaeba64c4
-
Filesize
88KB
MD5a8e80eea1f707a6caf8097e52748d442
SHA1c10761814cd27be053f24bcfbd739488fda16707
SHA2565fac5fccbfc9c63dccfeff832d5219f02b8012279a14d50aa96178c94ade7ded
SHA5123052026adf3234b75c8f3ec49a66e9375db5e5e34e033f69c12b7ce45f6668a4e0fa792e3ebe3b091b052ecda1745454a2e48675dac4cb64c1154d46de08440c