Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 21:27
Behavioral task
behavioral1
Sample
1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe
Resource
win7-20241010-en
General
-
Target
1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe
-
Size
71KB
-
MD5
04f6650d9b17bcc0c0409cf712c6b0e5
-
SHA1
7753d3937251fb6b657fae9eb7efe221e3057a5d
-
SHA256
1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669
-
SHA512
bc7c7decc774484c3d59513e85e181287efeae2fe2b22ee45b3b85961a03957fb762928e07385d786a71c5945e2b46bccc2f1c574cc1c6ee2a92f18f68b2e564
-
SSDEEP
1536:fd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHV:XdseIOMEZEyFjEOFqTiQmQDHIbHV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4404 omsecor.exe 448 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1520 wrote to memory of 4404 1520 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 82 PID 1520 wrote to memory of 4404 1520 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 82 PID 1520 wrote to memory of 4404 1520 1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe 82 PID 4404 wrote to memory of 448 4404 omsecor.exe 92 PID 4404 wrote to memory of 448 4404 omsecor.exe 92 PID 4404 wrote to memory of 448 4404 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe"C:\Users\Admin\AppData\Local\Temp\1e3a4a2d82281040e58098f44797cb310fcc3b808639250e57e038b50f2e1669.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:448
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD59543c45a106cc2aecb703a8e4e944826
SHA1ee4807bb2d01fb9277609da329de7e0481a22501
SHA256c69a99fcd240811ce7d5027e24e39d48257bd9f9063b4e164eae544d546f9f8b
SHA51277d75a0413e40a98affe5b73fcac617d38ba8013979f463e2d0b6e3a64428a2215cf7220777834d945aa4c459a6d7e1a67ed496755f562fbdc167f60c9ebfd1e
-
Filesize
71KB
MD572bb4c4dffcb53580dac39c4526e8efd
SHA11cb36c024f91ca2b360a4aed837d40b6d46e7e56
SHA256e1652b3d4dcf4a4306e96e0a5083e57d8c11a6899ffe29602543ff23e5e41f08
SHA512a77aab13c5512131f615d503b43f191f0b0cb37947a6978e436b81e4a81ef8b7317b55fc5bfe1eda38db9979380b332602c4d969dcf8ba3c5dff81bfa053bf5b