Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 19:15
Behavioral task
behavioral1
Sample
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe
Resource
win7-20240903-en
General
-
Target
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe
-
Size
92KB
-
MD5
2be30265d272f74f1aca2612f0684f54
-
SHA1
a36210ff240468e9f2cc25a5848689629c917e83
-
SHA256
015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033
-
SHA512
645594d199256ebc93cd344a915d29b2fef503abe3ca2e8acedb7386a14b08ff4cc44dd4c0dc25c4de5867e742c8b935ea2ce76b6b4808873958c639ef40a2d7
-
SSDEEP
1536:Xd9dseIOcEr3bIvYvZEyF4EEOF6N4yS+AQmZTl/5d:fdseIOyEZEyFjEOFqTiQm5l/5d
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3984 omsecor.exe 4808 omsecor.exe 1560 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 212 wrote to memory of 3984 212 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 83 PID 212 wrote to memory of 3984 212 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 83 PID 212 wrote to memory of 3984 212 015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe 83 PID 3984 wrote to memory of 4808 3984 omsecor.exe 101 PID 3984 wrote to memory of 4808 3984 omsecor.exe 101 PID 3984 wrote to memory of 4808 3984 omsecor.exe 101 PID 4808 wrote to memory of 1560 4808 omsecor.exe 102 PID 4808 wrote to memory of 1560 4808 omsecor.exe 102 PID 4808 wrote to memory of 1560 4808 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe"C:\Users\Admin\AppData\Local\Temp\015eb74a40ed673508cbb498237fa63e48b4940fc6c32d3d5e5dd4598b2fc033.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53cc3dddf78d693cf1f89dcbfa1e6845a
SHA1b71e5d7bbb3e29370dea355730dd5fa91ed5355b
SHA2566c0d56d5efb0ede688f814694baf3c73eea60fb114087c0c663876255b8448b2
SHA5126aab351e3fe97ca277ee42f79d2a684142271539b92618bcc921c8e1f10e768c108c8b1709c4b2bd348b194b090664be7dfe38eada7e6631009a3f5d1b8ac293
-
Filesize
92KB
MD5ba65bb96fddb219e2d3a4c102a0004af
SHA1c472ba2226537accd3e2f18d05204216dc4d7db1
SHA256eeb135b02a840d285641fe3bfa1f188c1e7c11d8d75c3b0516e52587a45bf13e
SHA512a5764c6ae9ad2fad0b7afb5e58a16fd3f7cba73dfea53428a54ee86e413f1bd1a64a9d05a090f1e12c9aeb772a3af707966c0419f42c9caf7aedd92a1f73b9a1
-
Filesize
92KB
MD5fd92357e92d75426f9a83bba8033db3b
SHA116d5f64d8a8718310b7e06108675b5936d8e55b2
SHA25635ef9c0b871d607fc58169212a5ebe21076d8269ee6a921a5ea7f200eeb8eb3c
SHA512aed2a14bf101bc96796f2ea536c7aa16dd8baba75a04e593ed16aa5c24e052ab71d74f744d486ebe9db145d3cd9b8c2bc59e5f1de8cff6b5f302df237b498295