Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 08:55
Behavioral task
behavioral1
Sample
5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe
Resource
win7-20240903-en
General
-
Target
5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe
-
Size
80KB
-
MD5
05fb1bd5a07f2af2f887d2d050bc7150
-
SHA1
95d4377c79e2807bcb0429c3140280908cdef99b
-
SHA256
5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086
-
SHA512
cbc9344f723abffda13c6be833e6597a8b24721f73792a322ff9a7c5f3a5425528f94ce9db71dd63d38181441a3e958160a2ac05bc53ad05ceca0776a65144cb
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:edseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4208 omsecor.exe 4472 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 704 wrote to memory of 4208 704 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 83 PID 704 wrote to memory of 4208 704 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 83 PID 704 wrote to memory of 4208 704 5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe 83 PID 4208 wrote to memory of 4472 4208 omsecor.exe 100 PID 4208 wrote to memory of 4472 4208 omsecor.exe 100 PID 4208 wrote to memory of 4472 4208 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe"C:\Users\Admin\AppData\Local\Temp\5493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD56bada2b841fb090976ba32f4b8476519
SHA162cec480147a18fc3f76310981b3527a81b0aae6
SHA256bf6aac463e87825aac56af0ea84d6e33e959e8046332d3e206c4870831b6598f
SHA512ccc33b520601b6b13255353a8ed0c0d429d2db43f4af050e8ea3ac511c26fb53772d5cb27490dbf844726f6dd3b67d9579651b71f1f3347fd601b3d8e31a479f
-
Filesize
80KB
MD5d8ada3733635645e5b51b7aed9c297fb
SHA1097c00f8e56f1f76c1c5fa58e7c625c980dd27cd
SHA25653759c5b93cfd0138e23f9af4553f6ee4c3292858af32916923a8837833ba2b9
SHA512c8ab019fb037d520156cb1fdd4c48259ff56f31db89f667e1ac3cb77a2180ce12b2c34eb3f3ca2cf5909f7656f47bab5a15563496f700a2231a59527a67afc43