Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 22:01
Behavioral task
behavioral1
Sample
5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe
Resource
win7-20241010-en
General
-
Target
5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe
-
Size
64KB
-
MD5
9c29b196f9691c29658a4d1b3cac6308
-
SHA1
8b07aefb5869ab43b3c9c39476a5c8e24bf847be
-
SHA256
5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa
-
SHA512
1b39ee5ee93ccfb039c762fb2e2b5f5bece3107f6ebef01b8718094b2186bbd2b8ff67eff80dc4107723706038b61f01a9e89b146527c63743ccae65a5feb238
-
SSDEEP
768:JMEIvFGvZEr8LFK0ic46N47eSdYAHwmZwSp6JXXlaa5uAN:JbIvYvZEyFKF6N4yS+AQmZcl/51
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1784 omsecor.exe 1932 omsecor.exe 2256 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 448 wrote to memory of 1784 448 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 83 PID 448 wrote to memory of 1784 448 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 83 PID 448 wrote to memory of 1784 448 5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe 83 PID 1784 wrote to memory of 1932 1784 omsecor.exe 101 PID 1784 wrote to memory of 1932 1784 omsecor.exe 101 PID 1784 wrote to memory of 1932 1784 omsecor.exe 101 PID 1932 wrote to memory of 2256 1932 omsecor.exe 102 PID 1932 wrote to memory of 2256 1932 omsecor.exe 102 PID 1932 wrote to memory of 2256 1932 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe"C:\Users\Admin\AppData\Local\Temp\5535f23a5f387d1b3656bc3d3a2a7a2112136d8e0cbe01688494aee35280c9aa.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c86028c26e9fd8716bb1297917ca60b7
SHA10281bfa52622ecd4b07a1735f3cc54e58298d8ab
SHA256dcb360e74dd8bdbdf0e3328be626c7a5d33f80bd0167502b448a2d1138aecdfa
SHA512c2160f64524018ed93ab9878f1b0cb7a0311534b109d5c982baf5fe71d0453fc30b139cd97b6fb26d15d522b2fe33ae3b8c19e59cf525941406b59fa9ff96814
-
Filesize
64KB
MD599d9dc789400b86dd2c6fdf5552d6ff2
SHA1a7dcdf5962f7fa36b2fb9f2db030f4c04bca15ac
SHA25637fb8f23759defe1a74e73c5417162b9de7fbf9bec53d21944fb3ec0e502eeb4
SHA51247e3794c26d8a3dde4107403199fcef410b434729bd1a5d6d0c82193fc6e16105b68027c4534070f862cdf2a3b6b43c76740d39bfdf628e14a8cb03709a491f1
-
Filesize
64KB
MD5416313292e8484ec7488301be7597c09
SHA1cab41ff463453e0c5039dfb13028a996fbccdca6
SHA2567bc45019d366f03f437796cc996a5ffa5872e2836d83865172f3d2fb45b88803
SHA512dc116205e71c1c437171d0d09fee2cca0c19128c2efe50a85699ff5f707430b8fd7e26a9c4329728e64534772ff1a3650c4e744305ce402b0ff3edff70065201