Analysis
-
max time kernel
101s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 23:31
Behavioral task
behavioral1
Sample
ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe
Resource
win7-20240903-en
General
-
Target
ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe
-
Size
92KB
-
MD5
fc6d20184221e54e05c2b331755ed850
-
SHA1
a8f8a5d37d9598cf08286d55199da6135d6d3f1e
-
SHA256
ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88
-
SHA512
e7eba10f0af0d2e96ef928e91e5497769370446f999783415c6c1e6963591b740dce47a52633511baf03605d11392b13bbf281dac5fe107433268982c892e132
-
SSDEEP
1536:Pd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5d:ndseIOyEZEyFjEOFqTiQm5l/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2552 omsecor.exe 4864 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4080 wrote to memory of 2552 4080 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 82 PID 4080 wrote to memory of 2552 4080 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 82 PID 4080 wrote to memory of 2552 4080 ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe 82 PID 2552 wrote to memory of 4864 2552 omsecor.exe 92 PID 2552 wrote to memory of 4864 2552 omsecor.exe 92 PID 2552 wrote to memory of 4864 2552 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe"C:\Users\Admin\AppData\Local\Temp\ae41ed19ca651c1b720b51906017a5679e4f501f0a0f6e06e2cebb7976e78f88N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5ecee38176c07d0a24a1021c3224673bf
SHA161605f34159cfe3dda30407cecd28797781ae162
SHA2562c8b81b810ffd5e755a86102d5477ac1cd5cd47886e1f0c0270f0b436620d743
SHA51239d0998be22b4c7e659833b2abddc07c2983d7757a003ecb0b30701f55a6aaca56c0e0cd1924423c0d34acdd0294aa6c9e58005f752d8f3c49d3c665fd267a6f
-
Filesize
92KB
MD5abcf9215339f776e235418867ef5e0e8
SHA1f2da4489476e443a43a51d611529e26051dcfda3
SHA2566732c0ed8913dc3ae8c0eeda35666a21552df3fca8e0bd5d88efc4e9253e7c78
SHA512415d45b912319f0e93d4b1a70bff5edccb0a6d244ceaf97a03148bb0b92776d276cf39472c7336f6fbc4912f8a6fcec28aa2acf5167c5f1302ae343fd2e4e424