Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 08:07
Behavioral task
behavioral1
Sample
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe
Resource
win7-20241023-en
General
-
Target
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe
-
Size
80KB
-
MD5
de95f56d652d6d483f6d2c86b5d585d4
-
SHA1
bbb0630319bbc561b9bb85f40feec39957a10dac
-
SHA256
6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98
-
SHA512
24ce35bdbbdb323ef8403db13ed92d43d4ad25bdc80ce5570b3046bf41edefb99c8061714f63153cf959deb899daddd59d65a13e5c1298ca257a8100eea521df
-
SSDEEP
1536:Id9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzx:4dseIOMEZEyFjEOFqTiQmOl/5xPvwd
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 5028 omsecor.exe 3312 omsecor.exe 1148 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2644 wrote to memory of 5028 2644 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 83 PID 2644 wrote to memory of 5028 2644 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 83 PID 2644 wrote to memory of 5028 2644 6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe 83 PID 5028 wrote to memory of 3312 5028 omsecor.exe 101 PID 5028 wrote to memory of 3312 5028 omsecor.exe 101 PID 5028 wrote to memory of 3312 5028 omsecor.exe 101 PID 3312 wrote to memory of 1148 3312 omsecor.exe 102 PID 3312 wrote to memory of 1148 3312 omsecor.exe 102 PID 3312 wrote to memory of 1148 3312 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe"C:\Users\Admin\AppData\Local\Temp\6edf465105aaf58ce398d7072e25d8329469469970596a076b12bccf7c1eba98.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1148
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50dee1f12a410a2d6b8440ce2e8d3c83d
SHA1741aa2b07d80cb636ce2b1c223916f051fe551cc
SHA256670669bc33bd51e25f6fb61d67dfca62665431395ebe3e42b2bc044b273c4bc0
SHA5126a3f70b1afa74d36dac7c5f9c6748a36ba79598dbb462bcfb4dbafc6c3f4efe88faa4f16a66670cb99005b630bca94a29a49eb10019ac44dd7fc0e65dcea7b37
-
Filesize
80KB
MD503be010ef5cb0587a786725364168a44
SHA18f029fccde27c604f1e41538fff1e3edaee8f42e
SHA256e0421e9086c04d3e83b998a4b5653a4c71099d3ed688525599bdc6ee49dbdde7
SHA512e85972d4d42eecf3770eff8413141b29003e0a723c88266de4a6a13f1137e8f87c3834f7599d9380dc8e88dd070a1f62a15ba1890152c318f7f308d6d67e9d12
-
Filesize
80KB
MD50ad78b7c9d1b0181b99524447024dc9d
SHA198cbfdc89fb3b30047e9442deebbbd1f6cda9ce1
SHA256f5a9a0bb7013846791075e3a55a69893ea2062838b9a47ed2b9314ce9f194c36
SHA512a70f2cac2acebcd398d2f9778e66f3eaf7b075ad8a4efe1b347b2f1bd4bc709f38143e5497c3ff9686fa0e70664d5ebfa8c23317f61c4b84d61ced1922e62a6a