Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 07:53
Behavioral task
behavioral1
Sample
8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe
Resource
win7-20240903-en
General
-
Target
8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe
-
Size
89KB
-
MD5
f48e5581996ea07ae99fe50c33d70e7c
-
SHA1
0b043c344c8357b147f9d6d3939df5a31ace50df
-
SHA256
8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea
-
SHA512
2365d344d905d85a93e08d322ff041b8b3f8db7f834b58b8bb26483b71b48bb5fb7d32c76b2d42b8c073a0b5105b596feec8fd867effb493a72a8846de1d93eb
-
SSDEEP
768:V2MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:V2bIvYvZEyFKF6N4yS+AQmZTl/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3060 omsecor.exe 3360 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3060 4012 8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe 82 PID 4012 wrote to memory of 3060 4012 8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe 82 PID 4012 wrote to memory of 3060 4012 8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe 82 PID 3060 wrote to memory of 3360 3060 omsecor.exe 92 PID 3060 wrote to memory of 3360 3060 omsecor.exe 92 PID 3060 wrote to memory of 3360 3060 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe"C:\Users\Admin\AppData\Local\Temp\8aaac2fed9e3a219d1790d3bde6ddbe2adf635d9d0ebd219484bca00e78a05ea.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5a4d0e21efb9ac04a7853877554cb63af
SHA108de5787b5d62cc2128e99c4b9fa9fb0cf708163
SHA256245eaa36fb2933049a90119736832542ac683ddb43c5135476d0bd590c80ed25
SHA512e4666edd86ecb267b9fa94fe504ab4b43b7f8e07ef64a490961d3963e25093825f4765468aa86cf11556dcd6ed50d949dfef6520059df4236fead6353e0ac94c
-
Filesize
89KB
MD5e9daec54c92d393c316349bc70219a95
SHA171d58e46e27630ede32c23120b4d1726914b1838
SHA256e818ea303bedf1aebb4908e1448e4197fa10f32bfebf1b78ae931b6959b20dc8
SHA5126331cf1d403765befe283a0ff6a4ce2a7ebf5aeb5fc3cda2550b5a9971c9a3a63f42a96a60cd12c146f3fffb1e023d992cc178127fbb01fe3c49fcc9b89d1115