Analysis
-
max time kernel
103s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 11:32
Behavioral task
behavioral1
Sample
59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe
Resource
win7-20241023-en
General
-
Target
59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe
-
Size
80KB
-
MD5
c70b906c7966a01b50d98bb0932f93d0
-
SHA1
6dce14bbf4a24f0473890e12bdcca47d987627c3
-
SHA256
59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2ad
-
SHA512
28767323e4126fcf9d9174b31ce98ae4571c97825e6286c170ca77466d0f9d030637fa6974548e79a76f97b28d75d8a56ae78b71e9c451d886cb3be2e29fabd9
-
SSDEEP
1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:kdseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 932 omsecor.exe 1212 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2808 wrote to memory of 932 2808 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 82 PID 2808 wrote to memory of 932 2808 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 82 PID 2808 wrote to memory of 932 2808 59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe 82 PID 932 wrote to memory of 1212 932 omsecor.exe 92 PID 932 wrote to memory of 1212 932 omsecor.exe 92 PID 932 wrote to memory of 1212 932 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe"C:\Users\Admin\AppData\Local\Temp\59d924fdd2b4730399536226684506bec34221129bf0fa0295d089b9e5def2adN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1212
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD57deaf7e97077c65a7c8c57bbe9036b1a
SHA1d0bed3c1cc8891c3e5948b9b76ec9c8d53a31141
SHA2560d6050201bf7f46eba5100007b783a044628e279f405fa0ca094a626eda166d1
SHA512dff936881ce0da77af2dcdf4fa8a8ec58d526d3d8405a712d1e3baed11715da2af8b93173e4a3b1430fb268ee824d5700b38d96befd35f751fb59f1cccd14de0
-
Filesize
80KB
MD52460ce84fa7085e5f79695b4666dca07
SHA1591019599ad6b0b5229eb2cba167fe6f84e0f168
SHA256158cb3a85040db0ef483eea9fe83eb0566cc68157a94d71dc1837702c43dd733
SHA5128e0db0477e117d329a2eb127b7fc766aa9cb54e92deea6e9e2542d74287b102f9b876efaa653629eacda39a3f106e634903343addf77652815bb43c6b7e99e76