Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 18:36
Behavioral task
behavioral1
Sample
11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe
Resource
win7-20240903-en
General
-
Target
11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe
-
Size
90KB
-
MD5
9dc74ef365860cecd6f424c3266a58a0
-
SHA1
d336ca7fa16851d7a03fec28db23d62c98e0d33b
-
SHA256
11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dc
-
SHA512
e6f4aa3db6afa5387a3bc9af0dbf882d8695f2576a739673483ea2a168e438108b2a31cbb394636f3a27b008482f6f8becc184f88b97f69c3bf79f5ec5195211
-
SSDEEP
768:uMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:ubIvYvZEyFKF6N4aS5AQmZTl/5G
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4248 omsecor.exe 464 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1472 wrote to memory of 4248 1472 11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe 83 PID 1472 wrote to memory of 4248 1472 11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe 83 PID 1472 wrote to memory of 4248 1472 11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe 83 PID 4248 wrote to memory of 464 4248 omsecor.exe 103 PID 4248 wrote to memory of 464 4248 omsecor.exe 103 PID 4248 wrote to memory of 464 4248 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe"C:\Users\Admin\AppData\Local\Temp\11c42be8f26b94a19b8e0d3116f67a07c2944c884437af9168feeebdc7cac7dcN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD550343c73958877351f975fafdbfb0e8c
SHA19cbed012dbb7032738d93582d8adec525ae79688
SHA256d953f621d2a6a7d208e0ea3aeaf0cef5902f2dc1fb46676d641a4fbdf73c6b8f
SHA5125347fdae70d55bb1073a8d20c05c841bc0695d13b9b68360c99fbddd5354c53781c9834d874f16722b0d73bb5e61253f8d31751495a4744a4c208b99f585854d
-
Filesize
90KB
MD5865e7ad3818db00f1821a95478720ee9
SHA1cac35a7b7c32dbdb436d29f1fa0aa2b09c746ae4
SHA256183b9bf5df018af32471e6218b46c61eca01a0541df0d51e974e4c61a2bafdce
SHA5128bcd0311ca2e2f1ac3de6cf16a2f8a10be5ac27262a66048add15ae2635ee4e7bd742762cdedf4743fb5300c33c83aba2f3b07bb30ec1aef6170e286f3ee23ff