Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 12:32
Behavioral task
behavioral1
Sample
3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe
Resource
win7-20240903-en
General
-
Target
3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe
-
Size
89KB
-
MD5
8c90eec341cae53ddc095f6284e909b0
-
SHA1
95b69b9bb5968b7f9edff459addd8f3be240e4b8
-
SHA256
3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57b
-
SHA512
3f93b3b650faf489d3aaf6e3a04a5ce2d124b269a377f167c12346184c346df74ec2a69dc88b1ef76858f6df2e73cddbe62f0d79bbc399b4b6a3f952c466c5e9
-
SSDEEP
768:pMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uA1:pbIvYvZEyFKF6N4yS+AQmZTl/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 808 omsecor.exe 4868 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 748 wrote to memory of 808 748 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 82 PID 748 wrote to memory of 808 748 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 82 PID 748 wrote to memory of 808 748 3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe 82 PID 808 wrote to memory of 4868 808 omsecor.exe 92 PID 808 wrote to memory of 4868 808 omsecor.exe 92 PID 808 wrote to memory of 4868 808 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe"C:\Users\Admin\AppData\Local\Temp\3e868c29818b585c04a42d756f168b65146152842d942f2a84f37a18299bc57bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5ed208d68a2c7dcc78827e9f30600007a
SHA1d22200bcb34d19d59b37e524b00a867880e360a7
SHA256d7fc049dcc78fc9b2ead333cf4b1d71905f09ff0b8346777c853096aa2149c88
SHA512ed6d4b3258bcb357eac73270bd6ca7175e3008f6210825dff5fb09c6284ab5a5e9232e8bad756047165e841f693e1fbb977f621dbea468a7e3eb4903241fb2fd
-
Filesize
89KB
MD5e42d703a44f0b9917567c4b57f57718e
SHA14c99ce48bbcf2e568be950b65e4fe3f5c96ba871
SHA2568f58cface8d9c0eae57062e85cb4e107cc1b1d0dbacb93184611f755825a6561
SHA51266a4910b2e63a9f93f033164e8265dbe43ccd1c60996a2a721c5b2999c8132a4f9228a2c548120f058f864a7653ae22ef4df491edfbc811fd5c496562a7020c6