Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 03:16
Behavioral task
behavioral1
Sample
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe
Resource
win7-20240903-en
General
-
Target
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe
-
Size
90KB
-
MD5
d1cbebb87a50f19ebe40d068ab9b2e3a
-
SHA1
1a40cc5fb7be80577cc1eabd53a48e6d8d64c4ea
-
SHA256
d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810
-
SHA512
c10eb92a6879effb6c9502eaafb327857f918cc0b820dc1015a072e55eaf3aaa37a9df13e857bca0145e0621989d586e1b6bd6727c5b16ed5f3630d6fabb439d
-
SSDEEP
768:EMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:EbIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4152 omsecor.exe 5008 omsecor.exe 2684 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4152 3796 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 83 PID 3796 wrote to memory of 4152 3796 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 83 PID 3796 wrote to memory of 4152 3796 d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe 83 PID 4152 wrote to memory of 5008 4152 omsecor.exe 100 PID 4152 wrote to memory of 5008 4152 omsecor.exe 100 PID 4152 wrote to memory of 5008 4152 omsecor.exe 100 PID 5008 wrote to memory of 2684 5008 omsecor.exe 101 PID 5008 wrote to memory of 2684 5008 omsecor.exe 101 PID 5008 wrote to memory of 2684 5008 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe"C:\Users\Admin\AppData\Local\Temp\d42d0bcec7908cf5141db8b57a09f5011b7f75943fcf4b4606c5e9e435ee1810.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD53fb88b8d1c9513e8422b9d72aa704cfa
SHA1e9de68e359efeb107025186e5e592ed6fe4f57e4
SHA256fe90f034415f9e9c7788636007733f591cdf7f364d87d60aac372ebd314737f1
SHA5126cd83373ef4852b57126bfe8fea5d3cdb8b0371c44438e00cafce955b1aadc0322a748b0330c909d5621d39ae3b4742103e7fbe07addceebde07e81fe39d4ac2
-
Filesize
90KB
MD56ba426446de78e3ed07c8211f028ef8b
SHA1835beafbc008cac4e94cb03dd9d808d315479d90
SHA2565a9ffa467ee5aa96a1e70ad7e0daafc66f6fa147202f7f412c48b9e7a32c0084
SHA512d30f804f290e3f628be0e495acd6fc584d877746538f498432fe5958b33fda1a38465246044879eaae7c699855fbe6a568b416df50dd493f356a198ab1e0d531
-
Filesize
90KB
MD5203ce65d3199e4a304e21ebc2548a5f3
SHA1832c8e0cc9b4d4c58f7488b318fbf78ff067d348
SHA2565d3bde7e462ef6a821bc5399173aef3afd51a694dc3bffbf7412ffb3aea2bf1b
SHA512e212046a61c9c358e78ba3f09a11bab7d3a10732d566a48dbe48797d0427e321feade3d4245e6e7a483ef27df4d922aeb3d4ce8885750c66f8a3a479db638617