Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2024 04:39
Behavioral task
behavioral1
Sample
fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe
Resource
win7-20240903-en
General
-
Target
fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe
-
Size
64KB
-
MD5
2a06742f5696965c00733c16274e43bc
-
SHA1
6a31e2c64968220c112a8056ff8a96dd59d8ebb1
-
SHA256
fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa
-
SHA512
5fb9f06afc0353c692e22092350f23cf4e5af6e4c7daae9dac3cf639898fe01b92bad6bac51b17a814d5b6c51bf9d22de13aa4cf9822bb0e4c66648b1cd707b4
-
SSDEEP
768:NMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:NbIvYvZEyFKF6N4yS+AQmZcl/51
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1072 omsecor.exe 1948 omsecor.exe 5072 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 728 wrote to memory of 1072 728 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 83 PID 728 wrote to memory of 1072 728 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 83 PID 728 wrote to memory of 1072 728 fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe 83 PID 1072 wrote to memory of 1948 1072 omsecor.exe 101 PID 1072 wrote to memory of 1948 1072 omsecor.exe 101 PID 1072 wrote to memory of 1948 1072 omsecor.exe 101 PID 1948 wrote to memory of 5072 1948 omsecor.exe 102 PID 1948 wrote to memory of 5072 1948 omsecor.exe 102 PID 1948 wrote to memory of 5072 1948 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe"C:\Users\Admin\AppData\Local\Temp\fe909fb43b4bf487f2ad19f672272ae6be0470f6f74397de0f9e1eaaa677dbfa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5072
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD597b7d89911bf88202780b5f04f743494
SHA12a32a1b87c761e7e089836e4c03f8fcf27ab4187
SHA256f702e73def7f5395b8fb0f29132b26704e9e86a027f53d25da0a13396ef02296
SHA51238c5e108246e037b804c5f1de122b0bbfae5409ab9e77c21579d819b926cd9388dddd577c88aad13fc3e306a0f22aa5f2a128b6465b3c98c8d133fac5299932f
-
Filesize
64KB
MD59c29b196f9691c29658a4d1b3cac6308
SHA18b07aefb5869ab43b3c9c39476a5c8e24bf847be
SHA2565535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa
SHA5121b39ee5ee93ccfb039c762fb2e2b5f5bece3107f6ebef01b8718094b2186bbd2b8ff67eff80dc4107723706038b61f01a9e89b146527c63743ccae65a5feb238
-
Filesize
64KB
MD5516b2cfc349ee63662d660c52ce07cb9
SHA1e303d66868cd79ba83694be6d2c94886b810f5e4
SHA256e1970efa0a83dfdcfbb05a94f52a29074d870faceeadfda11b5d82d2483504e3
SHA5126b29d9a281e5ddb68d1c413d54784c9d8d4c9a7a36e4a85f6d3a958b00ec434cad94a1b99add30b0039d9abac39f3df71370299045898fc957a4b217af354069