Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 01:42
Behavioral task
behavioral1
Sample
83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe
Resource
win7-20240903-en
General
-
Target
83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe
-
Size
72KB
-
MD5
e3caa2b64811f56d18ec442b55783d93
-
SHA1
25898cde48ad3d96d029b7d16a0110334686b8aa
-
SHA256
83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4
-
SHA512
a4e6274a5d2fdfd7de1e56c35fed12deb9800c8f1e61c57b0024bcd84f9e5bcc0d1f2571d22640efc67fd42f83feb15cfe92e8c39f27a35bd3810525541d7a7a
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211/:DdseIOMEZEyFjEOFqTiQm5l/5211/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3728 omsecor.exe 3632 omsecor.exe 3272 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4476 wrote to memory of 3728 4476 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 83 PID 4476 wrote to memory of 3728 4476 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 83 PID 4476 wrote to memory of 3728 4476 83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe 83 PID 3728 wrote to memory of 3632 3728 omsecor.exe 101 PID 3728 wrote to memory of 3632 3728 omsecor.exe 101 PID 3728 wrote to memory of 3632 3728 omsecor.exe 101 PID 3632 wrote to memory of 3272 3632 omsecor.exe 102 PID 3632 wrote to memory of 3272 3632 omsecor.exe 102 PID 3632 wrote to memory of 3272 3632 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe"C:\Users\Admin\AppData\Local\Temp\83e155c128406cebbfff635732a93a702b71f9adcec4c157c36a7a32f2ed97f4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3272
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD564eaa09bb32cdba091826c3dd653a10a
SHA1a4b0b67e36896e26e5ecc3bb05c05b7b6b3bb667
SHA2565ad0f2a2a563408df36a508112f9f89f09d53930641bd36257cc9f4aedb2d918
SHA512b962efb1ebeb459375351c0bc58409ae604fcaacde148c82f59f0a2c9b43746cf7a3cac613bb72ffd30616934d9a3bc36dfb7c59d949b19a31f540352215297d
-
Filesize
72KB
MD59e3c45541180556f2d05eb251d0d5fff
SHA19a54eb8c08789a0fb6311daa05796568fc6a5241
SHA256d1c03a711f6afe08c536825a6467c6affb77527be88a1c682ece305be670423d
SHA512d3f2fee86f1271fdff48c8912ce0158614c515f447f874478709fd5c96e92c443ec9f0c779c0269bed1058f064a4250f220fdd6d5f54415e37da8f1fde63912e
-
Filesize
72KB
MD5c2e05f53513f7e49eaff2aaaa495004e
SHA1bda46239f535fc62d8892e3b5af9f1bfae0c4a8f
SHA256ed196d700d10e8b5e025aaa2304f58bda3343f1307c95444c5815b2431eed8b7
SHA512d916342ee098f1749b38872358bfa218069ef515609acf701d4121238bb64a139818b2c61a8046fdfcccdd2be38f4cdf99a42b63e320b56b1aeb86efd2013a36