Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 09:35
Behavioral task
behavioral1
Sample
ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe
Resource
win7-20240903-en
General
-
Target
ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe
-
Size
80KB
-
MD5
9470866f27507e29f99d1ec06e9a9420
-
SHA1
d41cb77c832d9201f50c966508e75d97c59f85df
-
SHA256
ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52
-
SHA512
622d320fdd22431e5e068539b3704ac80ca994062d7d73f22c1b1ac316c7b82ba790a05eb0205105b444a7e5a31402f7ff193dbdab8ce413634420f7071dbff1
-
SSDEEP
1536:ud9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:2dseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 868 omsecor.exe 3080 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1240 wrote to memory of 868 1240 ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe 82 PID 1240 wrote to memory of 868 1240 ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe 82 PID 1240 wrote to memory of 868 1240 ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe 82 PID 868 wrote to memory of 3080 868 omsecor.exe 92 PID 868 wrote to memory of 3080 868 omsecor.exe 92 PID 868 wrote to memory of 3080 868 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe"C:\Users\Admin\AppData\Local\Temp\ce3f90337ff828af2c03fa476948061e41a7ceb9982dfb116c315dd77271ee52N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD505fb1bd5a07f2af2f887d2d050bc7150
SHA195d4377c79e2807bcb0429c3140280908cdef99b
SHA2565493709f2597c32d542fc38e26f7e5ba06e145ab697745cbb4fa808c8e980086
SHA512cbc9344f723abffda13c6be833e6597a8b24721f73792a322ff9a7c5f3a5425528f94ce9db71dd63d38181441a3e958160a2ac05bc53ad05ceca0776a65144cb
-
Filesize
80KB
MD5ab06522a6b6f4ba549d15281058d7d0c
SHA1b672fa7a7685aa89a51971a08f11d7202de2a669
SHA2569fc7a371635c66821099ff0522146785a004cb03be663f6fb7b26eab242c8702
SHA512c9257a037e4a360699709bdb5f384512bee2e8d0613d3baaf641a33287a969e2ca48c4ff2d86812a9082ce9cc84ebf068834cec081b49133337cd786c959bea7