Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 22:00
Static task
static1
Behavioral task
behavioral1
Sample
49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe
Resource
win7-20240903-en
General
-
Target
49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe
-
Size
33KB
-
MD5
493ff34e77901f716fab30569f3128b1
-
SHA1
34306b4a8a27bb745b8dfc769243cc762bd64c9a
-
SHA256
49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4
-
SHA512
16dbef0509ef3b4be44ab3e866b57fc4f782f2b9f280ee7e2bf000275adabe03fe9a7b76a9c7f4372aa7257f04237dfbeef676654fea95518f4bfd100d3b26ba
-
SSDEEP
768:KfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:KfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1780 omsecor.exe 3584 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1780 2896 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 83 PID 2896 wrote to memory of 1780 2896 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 83 PID 2896 wrote to memory of 1780 2896 49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe 83 PID 1780 wrote to memory of 3584 1780 omsecor.exe 100 PID 1780 wrote to memory of 3584 1780 omsecor.exe 100 PID 1780 wrote to memory of 3584 1780 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe"C:\Users\Admin\AppData\Local\Temp\49fcd6d4170626cba00ae03bb0f21b18e69a0058b87ce9548e15de9021399ca4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5f92fc5e0628606295f6cd606c22117ac
SHA144dc0ffaba50c24431bce011255103c07790c587
SHA2565391afaadd073bee9decab8bfbb45a74dffe284d692c1e74eed880a17b4cc1a5
SHA512aebbd0544743f923f38cb8e1c8592d75e31f4d41ec9a6276937a256e62e85f0d8900a5e04a6d59f9e55b3ad9907b72e4e19c4d94365eb2caf52492b24cc2bd57
-
Filesize
33KB
MD5d789a03a8aed4ed528d8bb4d6b0808e6
SHA1a44ef3fe1607a197af78e22d4797e5cff7058b14
SHA256fc0bdca6a5b185ec0ad860ed84b8be7e690aea21340ca263050c93c4c0c61636
SHA5120673972c0a3f3c6ba5229771a4dda02cf8e538d88bcb20336fb5e4d2682498d25bf2f9b02f93b8a620b800fd765b83b324ef708e1a7a382190f1ebd09c5fc8ba