Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 04:03
Behavioral task
behavioral1
Sample
f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe
Resource
win7-20240708-en
General
-
Target
f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe
-
Size
72KB
-
MD5
71217ef9bc8fb2678221d2fdc3760f90
-
SHA1
5cd3794c1f6ac6b7ec34c7b9fd0389e9943d400c
-
SHA256
f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c
-
SHA512
32652b61fc9d56d7f338d85a2f87db0acd233d64d4f769428cba122fd241dee1f049f7d04d518ca32775fa842c18a7698fc00d3b3df96c6d9a32ef6788f645ef
-
SSDEEP
1536:Kd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211t:KdseIOMEZEyFjEOFqTiQm5l/5211t
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 524 omsecor.exe 4660 omsecor.exe 4232 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1860 wrote to memory of 524 1860 f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe 83 PID 1860 wrote to memory of 524 1860 f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe 83 PID 1860 wrote to memory of 524 1860 f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe 83 PID 524 wrote to memory of 4660 524 omsecor.exe 101 PID 524 wrote to memory of 4660 524 omsecor.exe 101 PID 524 wrote to memory of 4660 524 omsecor.exe 101 PID 4660 wrote to memory of 4232 4660 omsecor.exe 102 PID 4660 wrote to memory of 4232 4660 omsecor.exe 102 PID 4660 wrote to memory of 4232 4660 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe"C:\Users\Admin\AppData\Local\Temp\f44ff06af34beaf144ef042998ba79e111e74bfc9a0f9b08fb0f39acfd37f02c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4232
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5e40a87a3b051e87ffd402662afd0acbe
SHA18265c181b98055ba7e87c17ac3858f308aed7c11
SHA256fe66678a433532088a3f36df4bd55a2f60ca8b7d0effaf146e5ddeb485e56c03
SHA5128fc0b5f6d5c7b3f9bebdf85e56bc5a8ba9b5b9ab8657ffe75b20fa944f8577cdc274b66ee5bd39324a5256bdd929926aa886c79bd6c9cc9fbdc62f93dcb6bdf4
-
Filesize
72KB
MD5195a82aaf67cfd82dea64d6f54dc5e3c
SHA1a27f39cd5e09a420677e80699e3195f57db3c8ac
SHA25672b3171fe3e2d0ba46ca49259954040fcddb7a1246e92ff985e92f04f36487e0
SHA512cd3e4052474eec523bafeb315271ac8a29a6dc1393a756363ee20e85cae2fe812e2c8d8942ef08591459dfeb2518732a376c0788cc1d10a329457c8398b4e4e8
-
Filesize
72KB
MD5965f147d5236774db6f73e0304e5b421
SHA1677c1276ab2e2d379a11f81055b320b499cf89f3
SHA256015f73773c0bb530f82489f47a4f7c79a763d42fc0995e6079a9bbd6eefa4f91
SHA512b29d6a975f54d9b4dfa35be7e14a0c366361987f5b47e5453d94d51818e04e95fde64429b690972fae906699b409709c6f1c881ec68e7c3ceacb5c8ffce0abe1