Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 14:06
Behavioral task
behavioral1
Sample
e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe
Resource
win7-20240903-en
General
-
Target
e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe
-
Size
71KB
-
MD5
fc338fd9432acd233b778aead852fecd
-
SHA1
caff8bcd56dfcfc463be596d3be16a6778811c33
-
SHA256
e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5
-
SHA512
9a5cb063018e4078f67bd2d9e3f98aa7e4c8c6557dabf655ca8905bfb2a5999b116316bbee5431aa807b465dba121f8e8d58c38f851a277716f8a6974b1edbd4
-
SSDEEP
1536:Rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH3:hdseIOMEZEyFjEOFqTiQmQDHIbH3
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2672 omsecor.exe 3316 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4496 wrote to memory of 2672 4496 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 83 PID 4496 wrote to memory of 2672 4496 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 83 PID 4496 wrote to memory of 2672 4496 e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe 83 PID 2672 wrote to memory of 3316 2672 omsecor.exe 102 PID 2672 wrote to memory of 3316 2672 omsecor.exe 102 PID 2672 wrote to memory of 3316 2672 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe"C:\Users\Admin\AppData\Local\Temp\e3dd5ed8129465724484351c339a0d79b6f856b0d52d81bd41011186294389a5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD57e1414109a66000818508244ed079ea6
SHA107acac5d3d103fc589bb0bb6cc40325d4969c92b
SHA256f6e30974e2cf2ffd8b1b48e9ac95d25166a34a9baa8da0498fd38228535c9727
SHA5120597b37dfb4b5f073495e4daa8585992977ab505e0f11193999d96eee3ed8960fed7e96337bd632e2a0939b852fbcc5c9bbfe836afbf33e5d78b320cf50cc167
-
Filesize
71KB
MD5903594d0a15223805bd925085c078311
SHA13eb4c991c209d0cdf502dbfedb25557d86cb5917
SHA25658153a6fb9be133fb242f23e2de89ce1361617d8e7952cef799a81fc89822991
SHA5122c63a0e57e4d0e1536ccdfe4d4286fc0d18e1fff4b2b0ece768df5a10566bf98239e2722ea66ec6bfae139b82a454faca574f6b079118db4cdd9e41298805f04