Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 06:46
Behavioral task
behavioral1
Sample
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe
Resource
win7-20241023-en
General
-
Target
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe
-
Size
70KB
-
MD5
b483ab5c9018ea96cb70d2b40c4f8d1e
-
SHA1
5d28d055562b55df9e4d4aa9e87c1a8907598d5d
-
SHA256
b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429
-
SHA512
3acd494d5c4264d186ad246fc7e189102b0b7deaaadcbb38556a618d04fe8bd29d1ef0368c97e05c0992a0f83759ca9fe6e7e6ec1f8b380dd1160388acbc1ace
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF+N4yS+AQmZsDHNzfE:cdseIOMEZEyFjEOFuTiQm+DHNzfE
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1716 omsecor.exe 1828 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3512 wrote to memory of 1716 3512 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 83 PID 3512 wrote to memory of 1716 3512 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 83 PID 3512 wrote to memory of 1716 3512 b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe 83 PID 1716 wrote to memory of 1828 1716 omsecor.exe 101 PID 1716 wrote to memory of 1828 1716 omsecor.exe 101 PID 1716 wrote to memory of 1828 1716 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe"C:\Users\Admin\AppData\Local\Temp\b308483f9fed901628a9341f9ac7e1546f44f1643979e2f70224e7e9612a8429.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5314f3c09230b1fd02e44991f7a3753d2
SHA10b65552bf6f4fefa40fa09060b1df05e39542680
SHA2569485a470fde4b2b07930258c8b999d1af7e342c6cfabd0b7e55fe6d0793c76a5
SHA5129c8864fb1b798bde20f18a64f859b16a327db44bc5dbf372e1e882db65d4a470b59b1de08a94a7960e57013eaa1df2464a7628e32c6848177dcb7d7e64c364b0
-
Filesize
70KB
MD5ca681ae8652097cf711c664a99ad2620
SHA13932151f2d76c2cba08ecd45cd7cfb7f2019b481
SHA256653140cc95991f1a9ee6d9656b1dc9ae176fdb4822728ab3daf3d39c4813e42d
SHA5129d13e51ff533e2c15f8e3319af380aad8612e476c0a629a4027985458563d52d6942f1a81f2ecb3a298902b9ceae8e91880b7ce8b498b2a589cc3a893ef76599