Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 03:07
Behavioral task
behavioral1
Sample
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe
Resource
win7-20240903-en
General
-
Target
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe
-
Size
90KB
-
MD5
d1cbebb87a50f19ebe40d068ab9b2e3a
-
SHA1
1a40cc5fb7be80577cc1eabd53a48e6d8d64c4ea
-
SHA256
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810
-
SHA512
c10eb92a6879effb6c9502eaafb327857f918cc0b820dc1015a072e55eaf3aaa37a9df13e857bca0145e0621989d586e1b6bd6727c5b16ed5f3630d6fabb439d
-
SSDEEP
768:EMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:EbIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4716 omsecor.exe 4088 omsecor.exe 5036 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4716 2588 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 82 PID 2588 wrote to memory of 4716 2588 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 82 PID 2588 wrote to memory of 4716 2588 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 82 PID 4716 wrote to memory of 4088 4716 omsecor.exe 92 PID 4716 wrote to memory of 4088 4716 omsecor.exe 92 PID 4716 wrote to memory of 4088 4716 omsecor.exe 92 PID 4088 wrote to memory of 5036 4088 omsecor.exe 93 PID 4088 wrote to memory of 5036 4088 omsecor.exe 93 PID 4088 wrote to memory of 5036 4088 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe"C:\Users\Admin\AppData\Local\Temp\d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD595344645ef556bd81c4a91ec7aa2eb1c
SHA163b8463c030b970b4e0578b7af6690f935fc8cf5
SHA2564e710dbf3ac10f57d489fb4c2a93a751bd52fa54b3361acd5c3cb44072507900
SHA5122de9c38cbbc9fbcdb7954daeffbcfd88e3ccf74c627d4dfc13e03f0c25eec24eb668405ef592fa6c738cfd4fe3b4d970ad07b04c6723a67429e342127589b16a
-
Filesize
90KB
MD56ba426446de78e3ed07c8211f028ef8b
SHA1835beafbc008cac4e94cb03dd9d808d315479d90
SHA2565a9ffa467ee5aa96a1e70ad7e0daafc66f6fa147202f7f412c48b9e7a32c0084
SHA512d30f804f290e3f628be0e495acd6fc584d877746538f498432fe5958b33fda1a38465246044879eaae7c699855fbe6a568b416df50dd493f356a198ab1e0d531
-
Filesize
90KB
MD5ab33f54a37d529b190cbd108e5949107
SHA134b240efabd50eeb8ad98cecfcf7ddc6c471ee09
SHA256fec576efb26d398428f97ae5638478034f86cca86a5da55348b5c81d74790699
SHA512460769d28025ea39bd03c626de2f495b254f486ffc2970a37e6d098fda4398a5d6db1fd62763a0b9d6a5ac0929be52e172fb7d25b743a9b74b15ba48928da6e6