Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 01:56
Static task
static1
Behavioral task
behavioral1
Sample
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe
Resource
win7-20240729-en
General
-
Target
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe
-
Size
33KB
-
MD5
d627fd51d8e3fcadec9782fc1ef67f9c
-
SHA1
c35250b53809f60ef1bdb0f7ef36af3ed2c4d1f9
-
SHA256
f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f
-
SHA512
a8d1b9e9fad63d5b69b9cc2e21e3dd9adea9c598b2a64b45f76808fe70d2d129af37ac301dabf128895f814abc209796f5d2a2ac91efe727d262ca4546e3cdc0
-
SSDEEP
768:XfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7Dd:XfVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2796 omsecor.exe 1468 omsecor.exe 2656 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4636 wrote to memory of 2796 4636 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 82 PID 4636 wrote to memory of 2796 4636 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 82 PID 4636 wrote to memory of 2796 4636 f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe 82 PID 2796 wrote to memory of 1468 2796 omsecor.exe 92 PID 2796 wrote to memory of 1468 2796 omsecor.exe 92 PID 2796 wrote to memory of 1468 2796 omsecor.exe 92 PID 1468 wrote to memory of 2656 1468 omsecor.exe 93 PID 1468 wrote to memory of 2656 1468 omsecor.exe 93 PID 1468 wrote to memory of 2656 1468 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe"C:\Users\Admin\AppData\Local\Temp\f0e716f347975cbc3fa7bbc003b44416842e9ed87b19aaf281b2e1171e0ec07f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD53188e2eed81e8040ef4e4761518b775d
SHA13019d39b1a3b2dd2847bbc585c0aa64ffe54f8b6
SHA256f91969973766a2ae75932ae0889536cd05fcb835724f2b98558a3912d0afc42d
SHA51251097afc1e6d69aeb0abedc3315cf9f69d316eb6665c3fc164d01af8caf96e14fd88e0780a07d200bd457ab13b10356d4394c26d3f0aa56809fa286af4c82528
-
Filesize
33KB
MD5ab7fdee41c544f19e60b4464b9a848f8
SHA16ee80e4d38700a6cfb49fe9320e480135cfd3733
SHA2561e1041ba8e87da63071234fa38acd1062c86436d455278aa844121419c6d0e86
SHA512f1969decfbca4a5348546735ba2a9e104694d883f353373f672bf700fae8139477390de8115b482c56be6c8874ecc244d3b017c7cf32f95a6b75ccd8a7a896cb
-
Filesize
33KB
MD5a5ae3daa88387187c3248003c0f1cb18
SHA1bb7f5f9fd4f121c8e58d51a387b94ee7357f76c2
SHA25637d2dac9a680ed9fd22b868faa524aed25269b21ee302b68dd3a2faaee63b735
SHA51250d7620b5db8aa46af2027f028cb5465527376a88c52276e93efd009f5125f238c24a4b231cf79d3994e6241b6ab6a030e706deee7f4453047b27c730955fcc5