Analysis
-
max time kernel
114s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 09:14
Behavioral task
behavioral1
Sample
7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe
Resource
win7-20240903-en
General
-
Target
7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe
-
Size
72KB
-
MD5
da80fae1b0461aac4465d185063171e0
-
SHA1
32abec75734c86cbca19fd71112b809f9640f63e
-
SHA256
7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30
-
SHA512
276d4d2f0f2cb43c85dc7688a1182966fa3565dd30298258c43ca0ef8807f8b5e898aec15f3ee0e612c9952aa70ee446ae41aeb80c4b7f08a6e91ea124db57a1
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211F:idseIOMEZEyFjEOFqTiQm5l/5211F
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4812 omsecor.exe 4388 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3160 wrote to memory of 4812 3160 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 82 PID 3160 wrote to memory of 4812 3160 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 82 PID 3160 wrote to memory of 4812 3160 7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe 82 PID 4812 wrote to memory of 4388 4812 omsecor.exe 92 PID 4812 wrote to memory of 4388 4812 omsecor.exe 92 PID 4812 wrote to memory of 4388 4812 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe"C:\Users\Admin\AppData\Local\Temp\7dd6305c97cb9c2a6d8469a657ae085f33ba28070654341f36505198808c7e30N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD576c2c1091ef316fac2979d3b1c4d61d7
SHA135a5f67107767eba1dda8928e8b202af47dc0f7a
SHA256539c1368beaefe25c0fa2fd6d76e8762387675a951fe50a0af54f06ee67fba1b
SHA512da8b1b4917bed41ee20fc64acd15c4d7057e0313d6ea9ab02bf9723439cb8f43a86ae77b4598f99f70c301b2c4b43b5dbf1248415ded0d41ab9979b96a15ac69
-
Filesize
72KB
MD5b8337db6ceebf8167802e888cafd9f7e
SHA1a62d5668fe2eb31c2e9d3ade643b654be6b6f6a2
SHA2560b8354b8b3602b65dc0ec997340ae0e9ad8857faa894370d0c1dc35e28ac72ef
SHA5127f5409d3d424d747967951060004fa6ba4213886991f9ee7efb5b7c3e5bdffead5134f59ca5b6c0be238a2fee310989a951c2830525b70cd099e906e38764024