Analysis
-
max time kernel
114s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 19:53
Behavioral task
behavioral1
Sample
97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe
Resource
win7-20240903-en
General
-
Target
97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe
-
Size
65KB
-
MD5
776343c921e3360282ec794ca27f70e0
-
SHA1
8f7c99f9c71d7444aa25af261bd0b17571b76127
-
SHA256
97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6e
-
SHA512
1a4023d9617fa52b54d1405a7790b57e197b6fb91489b698d50712d079766ec4e789351c27aee1adef26ee4ba701cfaea4a21faba9b0d1e7021a31ae32479307
-
SSDEEP
1536:Od9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hz:WdseIO+EZEyFjEOFqTiQmRHz
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3384 omsecor.exe 1172 omsecor.exe 3600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4204 wrote to memory of 3384 4204 97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe 82 PID 4204 wrote to memory of 3384 4204 97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe 82 PID 4204 wrote to memory of 3384 4204 97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe 82 PID 3384 wrote to memory of 1172 3384 omsecor.exe 92 PID 3384 wrote to memory of 1172 3384 omsecor.exe 92 PID 3384 wrote to memory of 1172 3384 omsecor.exe 92 PID 1172 wrote to memory of 3600 1172 omsecor.exe 93 PID 1172 wrote to memory of 3600 1172 omsecor.exe 93 PID 1172 wrote to memory of 3600 1172 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe"C:\Users\Admin\AppData\Local\Temp\97b187e01326280b838be47599ab5eae9890bffeb9827f2df247554de5c67a6eN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD548bd7132d989b48d0a6b8766d77f4b60
SHA1c47d9b3d79e7cf24e0ad87342491a089e1e3442c
SHA2564bf14d759489e666413b9c907a26aa9edaee72af6499f69c74b6f490fbab7fb4
SHA5122cbddb5444d2fb3489bc25b3d54b84dc3b7ec2cc3d6ad5cad04356b8c415b2233463048fdc81b2c04c73d449cd0d2e102257093bf4d492c6ec589208827774fe
-
Filesize
65KB
MD501652a2dbe84b8a859a9b71098dcf14c
SHA19c9b5dca8f8659582d86e47f1bd9a3b35f2a9c38
SHA25697bf0ff4d5aa12f0263d62426889aeb3c7bbf4a744a689d607057ab0056742c9
SHA51248276578a5415feb2f3c538a8f44d311d5cc119c6cba583abd541c9c24eabf7759bcb3eaacb189f6be1122accdfd4dc91c8e3bc3d54f98f31f2fe4bfc53b776c
-
Filesize
65KB
MD54542edca6595f12c780399165da52774
SHA1a3252c69b39f6a3c6d875166346a3aa362542ceb
SHA256f75b678fc7a8d0dd7fe94755e084a2518e38cc10d9fc4d484cc3e4b2e59a511f
SHA51221c653d5621626e6c8d26d1d3f82265ee23197d8d8945ff706f1d23344aeb60f9767a610ad7b211be11d6d41ee22199cb73534b581979df9bd78cb608fbe100f