Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 09:42
Behavioral task
behavioral1
Sample
591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe
Resource
win7-20240708-en
General
-
Target
591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe
-
Size
80KB
-
MD5
b17bb5698c11517a8b80cfbd8b9adc20
-
SHA1
94cac9fc306a82d8de3b8ca5391f021e5dfea5b2
-
SHA256
591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ff
-
SHA512
683d69164fb2b54be885c8cdcc5a184eee749e9dd4d82ad8ff9e8b78e3680d6ece62cd91a81dbc881a8116cfdcb222f48aa576388ef04b41027527571dae63f8
-
SSDEEP
1536:pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:pdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 5020 omsecor.exe 2916 omsecor.exe 4440 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3916 wrote to memory of 5020 3916 591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe 83 PID 3916 wrote to memory of 5020 3916 591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe 83 PID 3916 wrote to memory of 5020 3916 591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe 83 PID 5020 wrote to memory of 2916 5020 omsecor.exe 100 PID 5020 wrote to memory of 2916 5020 omsecor.exe 100 PID 5020 wrote to memory of 2916 5020 omsecor.exe 100 PID 2916 wrote to memory of 4440 2916 omsecor.exe 101 PID 2916 wrote to memory of 4440 2916 omsecor.exe 101 PID 2916 wrote to memory of 4440 2916 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe"C:\Users\Admin\AppData\Local\Temp\591ab074dda6288321d63e5326d495b95a45c03e898dc9d218741519ad9785ffN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55651a5f6f01db6dce286641441d73ff2
SHA1e4be69aa485a0adfb51426869b6a945da7ee327d
SHA256bc78831bd3765379d69b0260a51b721d4056d5cc28d4e74e37ef1c6c3cb646c1
SHA5128313f433ce224d5a80ce178882b1cda12d71cbeb445d11c1721250e313e597e49e18d9e24cbe20071250b2aa0493a63a7bfb08e81b48583f48ddda699926dc1f
-
Filesize
80KB
MD57e2a1833f861a653d070dc19699b7675
SHA1bf2c7008110c16069adbfdfdef2812a00456d91d
SHA2560e699972df601d2c056bd9fee2d3e3d4c8dbb905999683fc0bbb65965de35d85
SHA51256b4f188203e41a7866c65c801b6f23d02789721c29370b2a03c76712e427e907170f2b7098449144020e666556ccd0287cab687860a1f25e872b964ea88143f
-
Filesize
80KB
MD544500715e09d58e5b110aea2b9109671
SHA1be6b56819168020074390814e522775ef8e6cbd9
SHA25600eb426aef9c7d16aed118928b977a451c2251e88cad7fcd9c1a87792a70477b
SHA51292961fb36bf63d6f1f3e157391d1bbead1822343e2ab79bbe1a9e4c5f79c6be4b0b74aeec05c920f5523b2c4d2db63043ac570329d2fc58f34f38254025f8752