Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 16:45
Static task
static1
Behavioral task
behavioral1
Sample
d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe
Resource
win7-20240903-en
General
-
Target
d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe
-
Size
33KB
-
MD5
637edd1ab9602251aa5eb253460d0500
-
SHA1
4cc41715e0ed3622e7f660c08048a520aac99d4e
-
SHA256
d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9a
-
SHA512
a3d0086d659f88a7d5753e13a0871cd0160657d6e533e7088f1725aebdbbce4d1b0179f8f9e957f2f82df8a727d9f2c6f6ec52340e1deae60be2efbe4eac17be
-
SSDEEP
768:jfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DB:jfVRztyHo8QNHTk0qE5fslvN/956qQ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 916 omsecor.exe 1608 omsecor.exe 652 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2664 wrote to memory of 916 2664 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 83 PID 2664 wrote to memory of 916 2664 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 83 PID 2664 wrote to memory of 916 2664 d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe 83 PID 916 wrote to memory of 1608 916 omsecor.exe 100 PID 916 wrote to memory of 1608 916 omsecor.exe 100 PID 916 wrote to memory of 1608 916 omsecor.exe 100 PID 1608 wrote to memory of 652 1608 omsecor.exe 101 PID 1608 wrote to memory of 652 1608 omsecor.exe 101 PID 1608 wrote to memory of 652 1608 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe"C:\Users\Admin\AppData\Local\Temp\d118c7f77d7c8c66a6ccb603a02cd506480946f4c4ac8e48e136b7935a9e8f9aN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5dfe5db75a9f65a8907b3cc54f8ebe452
SHA1fc59ad34d97187e834f6018284fc107de17c3788
SHA256b33a88c8bc6b3398f45dab1fcf9c145653dd0bddb4fabbe2edcd3b92d8d5feab
SHA512155f31cf44cb7a09ab95d1a65f342b38a11a8940966439c5d898e43b559bf5b29f442d58cd77bcf51ce58dfe7d2115ab27cd724df69d60fd11d5b5f1b8b55f91
-
Filesize
33KB
MD596ac904076110c15101cc628317f9b50
SHA11acc2dd04d8db9532638c033143d5a6ad99de0b5
SHA256bbda20dd22724e1c05d0559ab8547606d40973ecc73bc6934d49a19624889bd0
SHA512367bf3302e05bb7cf1034311e83842cf1eaa376fa488f8626e46f5ff5b0d1a9f9cb7dd24dc9c9888842705b2dd54da127977e4b3bcac699ac89fa933e173b4a5
-
Filesize
33KB
MD5e9e35a458b50af42be5172d4c342e6b8
SHA1da3163fdb9b31b0cc4b99a3ddf72a2cc0fc14116
SHA2569d210acefa91f186471e45f3166b78631728b923a69e33c17b15da6932d9d4cd
SHA51219596add2cfb6b6936406e0eb83d934cf3f67645b4ae9ed8065b40f0d9b75e3a6ebb11ab7ebd298a71f7e276c0e3b35c446ff0d024db72f6cb51cf54bf11b48b