Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 20:18
Behavioral task
behavioral1
Sample
13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe
Resource
win7-20240903-en
General
-
Target
13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe
-
Size
80KB
-
MD5
4d0883b8168f0bf86222e8b6219c64db
-
SHA1
75bad7d8fcff49d6fb97133cfe806a6fd884f7e8
-
SHA256
13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099
-
SHA512
f9c77bd93b2bf9621ebc36d50ec1838b909159280902672952be4a8d5b45c995cf85e7a14cf11d7a71dffe504f3d3359aa3c2c0067705e35a7e2927c9f7036ea
-
SSDEEP
768:IfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAO:IfbIvYvZEyFKF6N4yS+AQmZTl/5m
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1712 omsecor.exe 4040 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3728 wrote to memory of 1712 3728 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 85 PID 3728 wrote to memory of 1712 3728 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 85 PID 3728 wrote to memory of 1712 3728 13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe 85 PID 1712 wrote to memory of 4040 1712 omsecor.exe 103 PID 1712 wrote to memory of 4040 1712 omsecor.exe 103 PID 1712 wrote to memory of 4040 1712 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe"C:\Users\Admin\AppData\Local\Temp\13e23f06bb6a12636bb53927af11e0a6b869dbb8445e8b1ce4a24394c1ac9099.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4040
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5dae79ad3d22465f19430f68373825dd6
SHA198028ac811c18030ceac656c1ca6482cf42902db
SHA256cf953ac51842d3131218d7e5954cc3059fb77bb090ea7503220ae96984a6ed4e
SHA512d293c9162c80ddabe518d593bc2d58ec9a3eba05a6f30a8b7acd2e021fdd19248e03463c4fcd8b3c2cbec15459bc49ad982ebdd3986fb3d1bd42ba994a64131a
-
Filesize
80KB
MD547117b4d2bb9aa19d656c54ed4353f27
SHA15d1b685285ed9a279c2670de7cb162317ca4efd0
SHA2560a9d2ab02b959d54b55e13699a8fb8942ba8c56828670fe00f685c427b098c65
SHA512cdae2aeccd60cf156fa3479d4ced20073c5334f5ba5f663921bc3ca162170deeb7c0e7b910bc7a6fceb76c825835a8510ec09acc08e0c6af32071702425e3bba