Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 00:58
Behavioral task
behavioral1
Sample
735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe
Resource
win7-20240903-en
General
-
Target
735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe
-
Size
90KB
-
MD5
0f4662f4a3e895d04e9545bbb712e8d0
-
SHA1
32344fe5ff404341298aceae54e1fb5961afb94e
-
SHA256
735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3
-
SHA512
6ab8c15638f42a00dd373099ae46baae3e0668e8bc096e573ed4158d2fdb115d003f2245ba02bd1f68489380a822f8549d6b1493dba6b9d5b3b120bd7efe0157
-
SSDEEP
768:zMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA6:zbIvYvZEyFKF6N4aS5AQmZTl/5C
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1728 omsecor.exe 3176 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1728 4388 735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe 83 PID 4388 wrote to memory of 1728 4388 735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe 83 PID 4388 wrote to memory of 1728 4388 735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe 83 PID 1728 wrote to memory of 3176 1728 omsecor.exe 101 PID 1728 wrote to memory of 3176 1728 omsecor.exe 101 PID 1728 wrote to memory of 3176 1728 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe"C:\Users\Admin\AppData\Local\Temp\735677d4143d776df89593901f262fbc479aa22bfc80db6ee91b6ec0efa819e3N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD55c6595cbc6600107c4ec47c15caf79d2
SHA148abdaa3a16929f1bc6a09d1c073e6151a61561c
SHA256a248a3df8f62406020a1e9a961e94a35946741ed705acb0edfdce190a7856585
SHA512775ab21c8da8f73efdd377447abd4ce80642eb1f60fb9d9874de69a0f19b3564aeec57716151a60ed5fe5f8268508be5031a2fd22eb95d2fbe4637965fd7fbce
-
Filesize
90KB
MD528fd224e88c14d761958210a94b735d7
SHA13a692b40940b05c0e59e91dc51ab625f41949aae
SHA25682c0cf1766f95e910de5fcdc7d1707f2df33459cfc8e2298c10eff4ff5dea583
SHA512bd6c51ece6dd66a4e9edbeb49967a34ae1507ae2e74be8bd33583b7169708bbe31cc229ef5b743344f38179e7d48b18b909fd4f617dbe3f49f160f28afecd8fb