Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 06:01
Behavioral task
behavioral1
Sample
00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe
Resource
win7-20240708-en
General
-
Target
00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe
-
Size
80KB
-
MD5
50364cbcb35131975258fd8d772c8430
-
SHA1
0781f40b409e2e09bd5a8cae52d659ac5fb55534
-
SHA256
00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9
-
SHA512
8fc1aa4c26cbe873284cdbf45d87d13e7d9646c028671d91289fe55952ac087c2469a61595bcd447211ba4bb55b05624d43d916931414b30da5246939d2c196b
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:TdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2376 omsecor.exe 824 omsecor.exe 4016 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4040 wrote to memory of 2376 4040 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 82 PID 4040 wrote to memory of 2376 4040 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 82 PID 4040 wrote to memory of 2376 4040 00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe 82 PID 2376 wrote to memory of 824 2376 omsecor.exe 92 PID 2376 wrote to memory of 824 2376 omsecor.exe 92 PID 2376 wrote to memory of 824 2376 omsecor.exe 92 PID 824 wrote to memory of 4016 824 omsecor.exe 93 PID 824 wrote to memory of 4016 824 omsecor.exe 93 PID 824 wrote to memory of 4016 824 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe"C:\Users\Admin\AppData\Local\Temp\00f8c51cb8458f3ba540aa5c9d6539d09ffdcd4b355fb3a37ef2e936a49486e9N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4016
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD54d443946764162f55497225872ed55b5
SHA1ed45491420970816627535c7646f380c8b05052d
SHA256f5470d09fd41bc7c95e4d7d831bbf725ac862ab55f2762fa7699960ec281b1c3
SHA51260b6dcb2ec5ebc43941e0709e75e8d83761474d03461a7ab7b269697e92d674602c093cd99dcbc23fcd95e93af8f104741d51705195ff4b97f837cbe24bcb800
-
Filesize
80KB
MD530b151ee9b1f8e0ba28b6a1a1686da14
SHA1a0e2ea29361dbb58f32d429db1adb17d9cd6212b
SHA256b1f559f066a2a9e0f5cc40335996da20e515e8f859e7066d35663462a9c5a222
SHA5122815e4c9bc0dac855bdcdc7cab6351aeafd7131de5408cafcd8a09aaca00dbae8f39d15cf78738c1889805777e6ae1fdca123953dc62d9477d43062194655f54
-
Filesize
80KB
MD51b400a9df8171e0aa92e5ce48ddb4937
SHA1d0e908c5183704dd7e3edaba0c822519ee532279
SHA256f66bddcc73a7488c8dec8fca66d3e5dea12e4ea8cae893905ca671969c892c52
SHA512ea69c873e9234508d1391850e4949c2b0ad2133af13bb1e1c06addbb9ef7ea73818afbb57631ae1b8441f91161bc4a6ff1e211893e320fb2c0ee6d4cdc43d95b