Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 19:22
Behavioral task
behavioral1
Sample
071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe
Resource
win7-20240903-en
General
-
Target
071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe
-
Size
71KB
-
MD5
eb2e14b5acaefa63f9c7593ccc7e4317
-
SHA1
74f9a4efcd34b590da803639d9757719d95147e2
-
SHA256
071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726
-
SHA512
753f2b39f7ccb82bfdebe362b2383ada3d3a0d68405703be1829eee3f59bcf459a1877405f75e7cb887c0c92dc3b6314d7bd2305c38d342abbf617460fffb510
-
SSDEEP
1536:Pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHf:ndseIOMEZEyFjEOFqTiQmQDHIbHf
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 5008 omsecor.exe 1136 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3720 wrote to memory of 5008 3720 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 83 PID 3720 wrote to memory of 5008 3720 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 83 PID 3720 wrote to memory of 5008 3720 071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe 83 PID 5008 wrote to memory of 1136 5008 omsecor.exe 99 PID 5008 wrote to memory of 1136 5008 omsecor.exe 99 PID 5008 wrote to memory of 1136 5008 omsecor.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe"C:\Users\Admin\AppData\Local\Temp\071f7dad9fd5bc17a273cae24a4d0c55895a202493e680db43b46c5a8c55e726.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD52bff5f4d2ebd63ddfe38037b2a5cc584
SHA160a239a0586a4bc802df5c4330661be874e5b84e
SHA2562abf589fe90b03a49dd6875d4a2827e754f3bb2daf45b0c24139ddf54f114461
SHA5123ce274d81cca879286ac73bdc7362a8585a5585cd470f5d9c4db3708eb6edf64f524f27c6631eb1f1addbfc681f678b47e0fc4a74f0b4828dc9bc3082a49cce6
-
Filesize
71KB
MD5b2df9d5901df82f1a55e19ed3e32d90d
SHA1318edb659877c4c13a9bbd50dea29ef2c2356bb6
SHA2566f57c8e6a296cb468b331d2019923f400a2ab393fd5c76ead60b50a9eb51389a
SHA5122a2782fa7af8d63226d6f66174d5d67e3f3fa599e698cf7bfa884018f5a655c9dfa1e44aecb198c935c8a2ef5fa6b511fb65011fc6c11b5f415d103736cdb7f2