Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 00:16
Behavioral task
behavioral1
Sample
41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe
Resource
win7-20240903-en
General
-
Target
41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe
-
Size
72KB
-
MD5
c406fea1e86130f0e3c5818d5a9c0e90
-
SHA1
e6010de19440e71921a4b0ae9ef5a9aae8b87799
-
SHA256
41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259
-
SHA512
e348e92cd80451a84ce98320e2007462b7bf99a93289e8393142f389138522f43c1711cbf47d39956dbb1114a490095b21a946179c312bfad23f84428e552692
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/52119:DdseIOMEZEyFjEOFqTiQm5l/52119
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4464 omsecor.exe 2380 omsecor.exe 2044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4464 2328 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 84 PID 2328 wrote to memory of 4464 2328 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 84 PID 2328 wrote to memory of 4464 2328 41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe 84 PID 4464 wrote to memory of 2380 4464 omsecor.exe 103 PID 4464 wrote to memory of 2380 4464 omsecor.exe 103 PID 4464 wrote to memory of 2380 4464 omsecor.exe 103 PID 2380 wrote to memory of 2044 2380 omsecor.exe 104 PID 2380 wrote to memory of 2044 2380 omsecor.exe 104 PID 2380 wrote to memory of 2044 2380 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe"C:\Users\Admin\AppData\Local\Temp\41aa28933ef15f314fbe792409ecf78634bf88ee712b3be5f6fbfebbe437c259N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD538503624d75e6a030885806a8b9a1275
SHA1b7a819b87bf43f191a6e791fa5dcbdbde1878645
SHA256600527fcc02eff3cdb01f65fa6fbab01c9127c415c08739509c9f0091c73bc2f
SHA5120e66179f4e9fd451f45ea9364255cdbd0f87c82d21970c6931630679a0e1956bf8f4374a3343fd3c5c0a2cc6684ccec1f5be9b5890e5fabace1e3f0f18d5c08e
-
Filesize
72KB
MD5edcdadc7cf9ebc3c93a995c6ec41fb66
SHA18bf83041951407e6758a24562730a953d3823b49
SHA2564f2bedb3f7bab41489aa00b6fd8315265c98cb19042895f875e2fb157a8cac0f
SHA51232c1730a158fba5861c161ea00a4cbf0623fe05d0ec571937e01bfbf85cb9b9bd26cd8182c0482b539f22438b22cfa0a47b069b7bd4606b2969780f64ab13c55
-
Filesize
72KB
MD54e5fe15cfa14a39e1f32b8ec77f8936b
SHA1412e1e1a22e3c69f85c37500a39ae8b6909d7f78
SHA25613b29bd2ec6656ddc5d0668b5fe2d1c3da161e7f6080dedb40e0c5f211554f8c
SHA512b4e130de57c58cb379f70872429798e063ddf853b6d5d7b26f2fe1ed00f34a467ad844f4f1e53457775c86c5dee768c88502881a67867dc78efc2b70fb9f41fc