Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 01:19
Behavioral task
behavioral1
Sample
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe
Resource
win7-20240729-en
General
-
Target
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe
-
Size
80KB
-
MD5
4d3cc41faa31eb96295e76864a47ea99
-
SHA1
d6fb975c6b1dad0bb857203bf41475bbc5a873f5
-
SHA256
60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c
-
SHA512
6757cf1be1dc65c7b876bad17cefb8b9ace5340249df9448a8ec331f11bda36447da7a36b3bb9831e06bd9f93da81af4af7e62a8307fc6ab2a1269fb29ad2984
-
SSDEEP
1536:/d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzJ:3dseIOMEZEyFjEOFqTiQmOl/5xPvwV
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4592 omsecor.exe 1964 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 536 wrote to memory of 4592 536 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 83 PID 536 wrote to memory of 4592 536 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 83 PID 536 wrote to memory of 4592 536 60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe 83 PID 4592 wrote to memory of 1964 4592 omsecor.exe 101 PID 4592 wrote to memory of 1964 4592 omsecor.exe 101 PID 4592 wrote to memory of 1964 4592 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe"C:\Users\Admin\AppData\Local\Temp\60d125e2ac4160043e06d89dee51a2038d6935e216aa598d91c6599ef605893c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55b0978f5c2fe1253a95af92680bbb4f4
SHA1033d632a43734bdea234c9dd2819f07d6cb91a6a
SHA2568d35f64d7f4e23eb47d46ae05a7db76e6769e6cd7cf7f4c4f50911b0805155a6
SHA512d795b234f3819e45db18c1642b48dfa256478aad7eef7b119b728d7a0a49cc71adf1d761c37a86caf00599e686e8776ce9c3da888f74940b3940b9f980c439d1
-
Filesize
80KB
MD5b18c10bae7d9a2232184e4eb9c6e99d5
SHA17b530ccdea4615e55b97a530e631e856c154fe63
SHA256975109362f7b854ee12f5b15717a4fec33525021794cf55b2e0f5df7e467c764
SHA512459f96d2dc79c04e3a0bbf1f805957fbf379f3f4069785c9daaf7e35a42b2028a7fd26d7f2347443c482a286322db9b36030f5463eaedaef61990345f4154993