Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 03:58
Behavioral task
behavioral1
Sample
389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe
Resource
win7-20240903-en
General
-
Target
389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe
-
Size
90KB
-
MD5
519d867d24254fc3f17e4aa7f280d060
-
SHA1
2980ef9482ff89981063de72b4dd89feb03c9656
-
SHA256
389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6
-
SHA512
78734a35028a4ff3192a055aaf114cbf80e3468d5b2363ad15aed0e09928b2fcfb0e5e1389825ebb0c8658c33adf8381c71078f5c58ec7f653d8872e5d55c9f6
-
SSDEEP
768:qMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAa:qbIvYvZEyFKF6N4aS5AQmZTl/5i
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3936 omsecor.exe 4488 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1648 wrote to memory of 3936 1648 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 84 PID 1648 wrote to memory of 3936 1648 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 84 PID 1648 wrote to memory of 3936 1648 389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe 84 PID 3936 wrote to memory of 4488 3936 omsecor.exe 94 PID 3936 wrote to memory of 4488 3936 omsecor.exe 94 PID 3936 wrote to memory of 4488 3936 omsecor.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe"C:\Users\Admin\AppData\Local\Temp\389fde95e01625a4ca63e0629a397d5142d2798ada67b31051617f3c5b1757e6N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD559c6ecaac396fc940cb6ffd457891e9f
SHA13d41dfd0a38f7ae7b4ebad41deffd46c5a3f884a
SHA2568fca02e144bc770044d73c5a34a64914e29c65a6e02ea6e3d4f0ee3cfa49b5d2
SHA51246cf907413f5cbf980d9f931cba3468080df8ad91e2d063f3028922a1000c857288f383c824cc9f64117ca90e0c05b6ba165daae7da090f176298f9980efb1fb
-
Filesize
90KB
MD578b4ffc9d4c918b41dc4b76393394ba6
SHA13dca0860ef5fca3a85d3745d34108c73b7106f87
SHA256f7dc3edbe0eb30cf4e4acfb7699df90ce45e4e218713c8daf5a28dc2cd6b2911
SHA512329cb000d1531302de32841a8e7667eb13f17568aa025a1b5a831b5daeb413d6d586f2eb2d082aca90589b0b910ecac943951e2d97bae9c62e9982ca078c36b6