Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 21:27
Behavioral task
behavioral1
Sample
9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe
Resource
win7-20241010-en
General
-
Target
9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe
-
Size
80KB
-
MD5
cc96a448da3ece78d16d94604b43b985
-
SHA1
424992ddd6f9af348df53e5d084945db032bedee
-
SHA256
9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077
-
SHA512
a9266a10afceb0456b18b23f171263a77ab80b55c5b9fd631c673fdb0f0ac80eb8d3b2f675e487a76fe47e7bb12a4280b08de78ca4fcbf8d446c153a3e6d8204
-
SSDEEP
1536:pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzT:pdseIOMEZEyFjEOFqTiQmOl/5xPvwX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 468 omsecor.exe 5064 omsecor.exe 3284 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2864 wrote to memory of 468 2864 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 83 PID 2864 wrote to memory of 468 2864 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 83 PID 2864 wrote to memory of 468 2864 9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe 83 PID 468 wrote to memory of 5064 468 omsecor.exe 99 PID 468 wrote to memory of 5064 468 omsecor.exe 99 PID 468 wrote to memory of 5064 468 omsecor.exe 99 PID 5064 wrote to memory of 3284 5064 omsecor.exe 100 PID 5064 wrote to memory of 3284 5064 omsecor.exe 100 PID 5064 wrote to memory of 3284 5064 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe"C:\Users\Admin\AppData\Local\Temp\9095f5790cfcb6f8a987cd3eded39ba47fdf6f76c4e64cef2f675e4d9a9d2077.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5414b303d630df27218e3afd36ad55280
SHA14780b15a5a55fbffb117d0f8e3878f29e25fd884
SHA256776037c7be6b35a1ba885b58f19efbbbdec8e768b493d078b1e21715ae75249a
SHA5121e4f276c878d53c2293e941e8e2639d6874f1f76fedf4621d8ac9692a2f1b0f600d5fd50636cee28844354f81d1eb595a1ef8e63aa3acef81fe014fee896c092
-
Filesize
80KB
MD51b06d285a05dfaec310061e5b0857a33
SHA14da4e17e1ef186c8e9184aac9ce24bcb74578340
SHA25602b980eead4fd2bb4c1d1e9d61235de437f0c42c8c723a36bf1936d27a730ba1
SHA512b6af4b397c722465762cd46836733ae6df7e7b42282b2946c726982fb8b98c6a5306188f473f7a2ca12919ca9c008a7e1159acf4896fdaf476d45cc52b93d143
-
Filesize
80KB
MD5945f9b960cd6ee70ca288d905bbdc6dc
SHA1da96151559f69923fbc633596b724a06db5ad530
SHA2562b2044713b16a40c7ee0d37abf5e3db82b30093de254ba8eb2e70588caa0c18e
SHA512918147d78d5e467f387714154361f2d548e98cc27bf4f877be9dbf39b61b1d23116818e6e2c645ad293b05ad2d4de979e7a6763e7dac25eb9a6a559bf7c06373