Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 04:25
Behavioral task
behavioral1
Sample
b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe
Resource
win7-20241023-en
General
-
Target
b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe
-
Size
76KB
-
MD5
45aead127cba32d28b8412ce31abf7b9
-
SHA1
86d1cb708af4cd462a2293b5157701912983f02b
-
SHA256
b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd
-
SHA512
9a39f15d0b632316cd2796217292efda138f43486f4584f0a0b5b774ad92fadfc140a9e6b10dfef06fd5dd266319deaec300a7c047344bf571a9fa47842ce636
-
SSDEEP
1536:td9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11L:FdseIOMEZEyFjEOFqaiQm5l/5w11L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4484 omsecor.exe 3792 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4484 2980 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 83 PID 2980 wrote to memory of 4484 2980 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 83 PID 2980 wrote to memory of 4484 2980 b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe 83 PID 4484 wrote to memory of 3792 4484 omsecor.exe 100 PID 4484 wrote to memory of 3792 4484 omsecor.exe 100 PID 4484 wrote to memory of 3792 4484 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe"C:\Users\Admin\AppData\Local\Temp\b85c3b1fb54025dceaa88513195383fb2f4db5fadec7ee4044615f66848ea7cd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3792
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD54b6fc7b37282d691039c338ed150f544
SHA1f20ad852c5e80002fa4b0b597b2c2faea0dfb99b
SHA256b7ab9440fe5abec012fedf2062374452b2e0afaceaf7974de8319e24edd12cbb
SHA512e898e75840c2db8555d622ccc8153398a8d79b711c432692322f557f2a2e74a64071aedf99d0a5d27a432fee6167f0b36ba8777a5d41d15de85363665452261c
-
Filesize
76KB
MD5ce1aa886c43c29a37feddb9eed663d44
SHA1cce667dab93d3f2554f9366cb2689f90a1a4db6c
SHA256d4267151bdc134093ec0d1783ac30db8c5194218b245811941b7e1e6d2b26ba5
SHA5125ed0a63cfeaf81c1ee7ca4b6a169cffcb46547586af784085c3e0801e9f143bcf25ca1aa42a281120dee08d93ae104111414995555820bee4c3a8fddfff420b2