Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 20:05
Behavioral task
behavioral1
Sample
6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe
Resource
win7-20241010-en
General
-
Target
6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe
-
Size
80KB
-
MD5
2c6d907a021a3e632cd126097530db07
-
SHA1
091240037a81704fa68ad25dfcde053c137056f4
-
SHA256
6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca
-
SHA512
2d60a2ab443835480d52fb54a9396e29e3dab742c6f7b815ff1b28e9781c6eaa36ce1f05e340a2d42d777e493ce7c0b2f19695ee78b837a344d655d5f045d137
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:LdseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3440 omsecor.exe 4912 omsecor.exe 4892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2584 wrote to memory of 3440 2584 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 83 PID 2584 wrote to memory of 3440 2584 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 83 PID 2584 wrote to memory of 3440 2584 6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe 83 PID 3440 wrote to memory of 4912 3440 omsecor.exe 101 PID 3440 wrote to memory of 4912 3440 omsecor.exe 101 PID 3440 wrote to memory of 4912 3440 omsecor.exe 101 PID 4912 wrote to memory of 4892 4912 omsecor.exe 102 PID 4912 wrote to memory of 4892 4912 omsecor.exe 102 PID 4912 wrote to memory of 4892 4912 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe"C:\Users\Admin\AppData\Local\Temp\6badad65fb6dc8b0a2cc91c483e2d41a5d7acbf8a2b8591c8e0cb9bf580b29ca.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD599d35734861d733db076bc78b8b3203a
SHA1d66656f965cfaf14a172c0bd9fef38ac1fa84af2
SHA25681fb8297696830f6663289aebe33e221e79d2f7fb621719b494ae98418851ba9
SHA51233451efe49765528e3e5f4404dc7e33cfbd105a6ce4a4fed8c299cf259fac65ffb275b6c09c65d3960a677b202aeed022fd3102a7f9f9c06142f93eb4e9c3096
-
Filesize
80KB
MD55a53261beb343d0fce658c2c097bd5bd
SHA1e6e54af7f170a02c3d88a6a955a002d76b6513dd
SHA256983cf0501d39b1abdff207cbe6ea75da87157acd47986cfc704eccc2e722d365
SHA512c44acaa209de9796c103c6479cd8ec8272c0b1dbc82df19872e65ff8d7bc01cbe1d2490dc1c4c6618fe00bb3e15d9cdc2b5be024608e89e9aa111547663a5d73
-
Filesize
80KB
MD5e406091367f71c67a04030dd844b8371
SHA174c654164b5f816a63a0c951e7f19d97ebf8c4cf
SHA256f58fd076f4bc0a2345ba9d6aec5b1a6e7fc5802234531adfe5692f7696e6000c
SHA512554a7732ccc760bb0b7de938a3660d99e5c029e0f35021fc26af557cf9e00354f980a8b66d55c43a17df2598984caefea705e5927088c64b02cd54e45e8e4046