Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 12:32
Behavioral task
behavioral1
Sample
d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe
Resource
win7-20240903-en
General
-
Target
d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe
-
Size
71KB
-
MD5
19b264530ebd88a4daa31dfde236dfb0
-
SHA1
77ca31c073d38dddd69c7285e03af799943c5459
-
SHA256
d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6
-
SHA512
1591692d119663c9d69388405884e98b8957fdb16391b6939565035d1174dcf1d187769acfbabb970578ee2bf83583e9ef1d8ae6d486a1ac6a236deef7d4c469
-
SSDEEP
1536:0d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHP:MdseIOMEZEyFjEOFqTiQmQDHIbHP
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2176 omsecor.exe 3112 omsecor.exe 2800 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3436 wrote to memory of 2176 3436 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 82 PID 3436 wrote to memory of 2176 3436 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 82 PID 3436 wrote to memory of 2176 3436 d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe 82 PID 2176 wrote to memory of 3112 2176 omsecor.exe 92 PID 2176 wrote to memory of 3112 2176 omsecor.exe 92 PID 2176 wrote to memory of 3112 2176 omsecor.exe 92 PID 3112 wrote to memory of 2800 3112 omsecor.exe 93 PID 3112 wrote to memory of 2800 3112 omsecor.exe 93 PID 3112 wrote to memory of 2800 3112 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe"C:\Users\Admin\AppData\Local\Temp\d66c874df0a51f5873fe388af4ba0426fac6fb569f7341b812a7a78552331ba6N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5009f4b308a07f930f5737059fa877701
SHA1f040d62232d6f57d2691358df8dba5325a160c1c
SHA256be607871b3b20ae7449819811664ced3c9ee56db7560792bf7c3b10dbacaf684
SHA5127a1f398af880762234791bceddebf0ac2389c958f0c8bbf6b108a6e1f616b7ef8cd9d43c1e638e03d5ce3c3cedd2c8b0aceeb11a5da22c59232e567924381de2
-
Filesize
71KB
MD5928f6081f6f7c37985eeeea6d7dbdbf3
SHA126d893ba535035dd88ec535b4ffd1a0338d906a4
SHA25671654e22d208d6aa238834a6f218c5e2c15758eae10277c39314c124ffa95e5c
SHA51250a54ba9ae8fe9ab48c07ed34d507214c27e64ca0d129ce14fb4ba2c002412d82a7404619328033196b5c2b348f69e734500b1aea4b9e00d6f2cae193daeda0d
-
Filesize
71KB
MD5ceacbe05bb2766a9f57dd8db55725250
SHA17fac70244c97cf2d2952807a2e9811e8e2cfdbfa
SHA256c6d46b123f1ca325f1d63f5ff9442301b4ec9bff6670ded888df2528abe20691
SHA5122a77fc6945e5462aa9d8ebb65f1f7bfa146c1cafe13abdac61f26a383de7a0c0c7e2e22246d03d11390cfe6e2bb28ddd72bde19a3ec1a92306fbe85c1ede6ab5