Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 03:18
Behavioral task
behavioral1
Sample
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
Resource
win7-20240903-en
General
-
Target
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe
-
Size
80KB
-
MD5
1a3aad5ce62edaf7923bab44dd9d8727
-
SHA1
03a9efa9b7f04d91b9282d553c98ee1735863ce6
-
SHA256
d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab
-
SHA512
c662c0ef129d7ce7b2dfb7ef62529a494ef6a7205fb346477076a4447e38c7b15cf2769a15bccf0602912f0030c656352c5b3a7aa1715b603be89d9ce6d5114c
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:DdseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3076 omsecor.exe 404 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2292 wrote to memory of 3076 2292 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 83 PID 2292 wrote to memory of 3076 2292 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 83 PID 2292 wrote to memory of 3076 2292 d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe 83 PID 3076 wrote to memory of 404 3076 omsecor.exe 99 PID 3076 wrote to memory of 404 3076 omsecor.exe 99 PID 3076 wrote to memory of 404 3076 omsecor.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"C:\Users\Admin\AppData\Local\Temp\d902ab87b358172666febc31d04f30cc4194f4bc1f6fdd1a40dec3bd52f644ab.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ffb185e8f37f93d3c1711dc2b5c70d20
SHA17e611d60e24f26db99a43bbe1d7be6905bb0c243
SHA25652194a535bb7866c71aa16a7f392eecc41a29907859acaeb58cc11136f3bc42a
SHA512b865b5d05fd2bea01ea47dd750aecc2dc7e1167ae3cac241efbe59d3cdf9fd96ae4ba3ae238903bb612bacf69b0c2b52bc9daaccf33f67de2ce64e958b18b4b3
-
Filesize
80KB
MD5bf76fc866f810ac7be91fd01ac0eb1a8
SHA1765ad4f399cb25e67118125c4c0ae0ed6dfcfe55
SHA2563baf36ae4f5075425401f903d67198b209e2a5775d7dd6efaf230ac03667b5a4
SHA5125a45a175cef7d7fdf318c98ed989d59e125fd6d191cbb599678fb16c16328bb8f4d6d1c079c4cc707d44a7fe404d47a0948afb24a81af54939ad103632d9234f