Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 00:25
Behavioral task
behavioral1
Sample
7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe
Resource
win7-20240729-en
General
-
Target
7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe
-
Size
90KB
-
MD5
1ae4087e15eb5000df50db515ff79745
-
SHA1
66d074bbdf7712d24d5e58e5e73b45eb5013bf46
-
SHA256
7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964
-
SHA512
a290cc9f8d72b1c3ad66022f5f767a21750c37a7b5e7996ab292add17a311908b8093de84df9358a570bfeb50571d9996759ee12c24aab92db646c242c3d7a76
-
SSDEEP
768:qMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAu:qbIvYvZEyFKF6N4aS5AQmZTl/5m
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1148 omsecor.exe 4468 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3496 wrote to memory of 1148 3496 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 82 PID 3496 wrote to memory of 1148 3496 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 82 PID 3496 wrote to memory of 1148 3496 7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe 82 PID 1148 wrote to memory of 4468 1148 omsecor.exe 91 PID 1148 wrote to memory of 4468 1148 omsecor.exe 91 PID 1148 wrote to memory of 4468 1148 omsecor.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe"C:\Users\Admin\AppData\Local\Temp\7dc80c1ae1a5e49a0b1269a03d62ff6677f3c0973f85b16509c358c9821e6964.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5d12b96cb784a78240ccd506eac9f36e1
SHA1281c065cc7e25a998e13028386b466b53b47db66
SHA2568cea925e85167d4e5d6e155deb6309649475222582ba1a663ef20323aca22b96
SHA512a6bc2c625f04332199ed08db2de9c06c4e551646f8c9994e230b05087b8864cb88339631d6bcea1b25054b237fa8929e27b0abd739340da426d71386c0b71999
-
Filesize
90KB
MD53504e1b154145ccea82f2db461e2accd
SHA115c79fa1eef3a161fe5970aad412db266e892bd8
SHA25694507c90c16e8275adc3e53a2f8c15e7afc17523436a386a8d598978a7b15cd9
SHA51294de433a18c561bc94cce72d7a326a84d358c283305b825bab3d685973e37ea47a1cdce37db320065dedcb5fc17447a0ed76addc5524b4d3e34a0623c165482d