Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 04:20
Behavioral task
behavioral1
Sample
6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe
Resource
win7-20240729-en
General
-
Target
6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe
-
Size
61KB
-
MD5
b39f829b6686b24bf83dd1c07bb4ea00
-
SHA1
dbea6a04c22ce7935ec1a3835571ff69ac878573
-
SHA256
6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362
-
SHA512
e5f7c5270b49afaa3ef6369f6ed7d441156b6c4c8d4b0790585545f13111eea1b3a09690f8af993e96859f630c43fb99f2a9d8d73dd402139571e30861619f22
-
SSDEEP
1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ4l/5P:kdseIOMEZEyFjEOFqTiQmil/5P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1480 omsecor.exe 3524 omsecor.exe 2288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3680 wrote to memory of 1480 3680 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 82 PID 3680 wrote to memory of 1480 3680 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 82 PID 3680 wrote to memory of 1480 3680 6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe 82 PID 1480 wrote to memory of 3524 1480 omsecor.exe 92 PID 1480 wrote to memory of 3524 1480 omsecor.exe 92 PID 1480 wrote to memory of 3524 1480 omsecor.exe 92 PID 3524 wrote to memory of 2288 3524 omsecor.exe 93 PID 3524 wrote to memory of 2288 3524 omsecor.exe 93 PID 3524 wrote to memory of 2288 3524 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe"C:\Users\Admin\AppData\Local\Temp\6db8f0963de9579a8da1f772575aff7bfaba64e8fc5fef4515a7b864fd120362N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD538de941c31e93aa9de200488441753fc
SHA1226915f416c76828cb41da33345360558551bf4a
SHA2567f770564cb47e0250086e36b9f62a3b94b2127db76ed63436e8b3f71be761da5
SHA5129510d038f41201b2aa7590ae20919c9b4a36c15d19400629683a4df3b02094ac218d85777383068265a7fec05dfc402e218a531a23d4ee6b0e81d196b89459a3
-
Filesize
61KB
MD5ab14be5452c9deab0b7932fd1af035ee
SHA1e9e7abb7e3b47868e0f0082c0a4dde74c5e41c55
SHA256b4d631c54725c994fc29e153d90c95b8759d15c7daa529b4d8686a1519141371
SHA512e04c4fa25f8084d972f1820afbadc99eb50e3994ac4aacbc2a558ae93eeade98b0cba24ffefc7b60c7d14cfac992cc1046e8c4762ec8da3ac68e5cb605ae6c54
-
Filesize
61KB
MD5b00e1299e1fe3cda0ed1161ab1ada5d7
SHA1ac11de5e272162cd4ba97b9874d3075e36b7d591
SHA25635349768b1fe3a6c94507dad6c06b8e2786d3d76588fbe3711ba347ceed57e23
SHA512693d9600af61691c3ce5d06cd4763da62f82195aea07c84a0350b770c36edb92f9e640afa6c76039898d1ff9ddc6c68f1ad6af20dcb7a9a83fcc6e315476893d