Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 22:26
Behavioral task
behavioral1
Sample
55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe
Resource
win7-20240903-en
General
-
Target
55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe
-
Size
72KB
-
MD5
8538eb5bd93e0f922611aab49d62bb63
-
SHA1
06911bdd368ffe7d31941775666f3894e94514f5
-
SHA256
55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2
-
SHA512
4058d0cc71d5a92d8080a786e69dd77854b7c5036a02659e5af9ecaabef5d5c1dd675991b57189a4a71ad9a66ee6ae4cde13beb48bc148d725aa56b568e7d4a7
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211:FdseIOMEZEyFjEOFqTiQm5l/5211
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4868 omsecor.exe 3144 omsecor.exe 1804 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3780 wrote to memory of 4868 3780 55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe 83 PID 3780 wrote to memory of 4868 3780 55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe 83 PID 3780 wrote to memory of 4868 3780 55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe 83 PID 4868 wrote to memory of 3144 4868 omsecor.exe 100 PID 4868 wrote to memory of 3144 4868 omsecor.exe 100 PID 4868 wrote to memory of 3144 4868 omsecor.exe 100 PID 3144 wrote to memory of 1804 3144 omsecor.exe 101 PID 3144 wrote to memory of 1804 3144 omsecor.exe 101 PID 3144 wrote to memory of 1804 3144 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe"C:\Users\Admin\AppData\Local\Temp\55c1a1685a4671c5d5662986f101500d9a18db6539ec4f4dbe4f234c8ef82aa2.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54b777a213f242b81f48c7109546699a9
SHA1d85539adc8080c61a51c916216d7039e5e321488
SHA2569084842e77d7c3979caccc5e605cf8f2f19c95a00e6432f34ff5ac9ac116a060
SHA512f1d0fd6c036ac4c1e60665b4b2e567645af3d8b405572251a60f54fa4de37c2796992a84af16d3677a7e018cc1acf2386d9ed69d7b2f7abdcdeb6afb7053f818
-
Filesize
72KB
MD545a9237c3acf8714d9244b7b28288d2f
SHA10330d40598341856a525fd412056c5a4105c0c62
SHA25653aa93ed6b121ddf539c7c3fcd92ede0fcd4691d994050918ecd161e660b0a69
SHA512935c8b756d17e4c0bf6fb2659029a6d32dfccef9cc8d45a242b918f8c4d35be9c4a01e9c472e4133f92989446b48ab5848b5f5209dd4f256121c568f58ec949d
-
Filesize
72KB
MD55de836c91b8abc5b5c21494b93e4668f
SHA19bc80a41481a260598c2e9ef62e49eff8baae671
SHA256d50343bd78df6753fb88aa3463aff8b922bbe2ff924c3c04f91b423c5ba33092
SHA5121d8565e2b82daeda4bfb254ddfe151f5ee30cb9bec56b9aec00d60a34450d5e5d2d714042928de308d9fea1f162ccf332d5dedcb689421c113c6333520dc33f1