Analysis
-
max time kernel
114s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 23:23
Static task
static1
Behavioral task
behavioral1
Sample
466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe
Resource
win7-20240903-en
General
-
Target
466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe
-
Size
33KB
-
MD5
8bb0f8c5173276d442c351f65756e220
-
SHA1
4229884a932f0df99549865f503c8569afa8bb8c
-
SHA256
466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2
-
SHA512
6dffb9ef4d934eed040a797a03e8169695fdc51fb2c9d89097291012cc7ad10a5318d63f0f0607ee90b7b94eb9b8b040c1ee2f93501a0f49809870c63367a670
-
SSDEEP
768:AfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:AfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4544 omsecor.exe 5068 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4020 wrote to memory of 4544 4020 466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe 81 PID 4020 wrote to memory of 4544 4020 466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe 81 PID 4020 wrote to memory of 4544 4020 466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe 81 PID 4544 wrote to memory of 5068 4544 omsecor.exe 92 PID 4544 wrote to memory of 5068 4544 omsecor.exe 92 PID 4544 wrote to memory of 5068 4544 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe"C:\Users\Admin\AppData\Local\Temp\466cbfa29c6362cba40c2b8c95030c5cf7b0ac95878c390f1cd4f3add0b538d2N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5642420ce2b21fa7d1bfa96921299eed5
SHA1a42a468f982b782627e236bfdcbb83abaa40cf71
SHA256ad48e1e48d7544f1d65cf5a8454fdb0aa060d38f21a4f64ee4af166b3c05585c
SHA51207a4012965961f278015ef6ea330d901b3e5580392922314308dd333e26a098b2febc00ae2cce932efbfcffa1c35283f72360d3d4e5e5c5e4c979025bc950be6
-
Filesize
33KB
MD5d300417ace96403d1cb0c1a91bc45225
SHA1cd841eed9d92fef3e208c9283691517aadacda03
SHA2560acc27c217f6092b8d7ade062116e8b55f5c8740071a2c419d4de9211321e6af
SHA5120d083ef6da64eb6cf5f3e9eae14de2b1659f2f81e7a5e6c7227f880a4ca036b2405a68809579e8b3d0811fcdb46c5d59026a513fafabff85238b7ffb963bb39a