Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 04:23
Static task
static1
Behavioral task
behavioral1
Sample
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
Resource
win7-20240903-en
General
-
Target
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
-
Size
33KB
-
MD5
72109d4d586848ae060ad7dcc5bd4c3d
-
SHA1
18a6cae894babf63e11965475f7ae09879dc6bf7
-
SHA256
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb
-
SHA512
2959a64b07d0156d906f41c492cf2d37c5d433a98e602e005c2c445c5d866e0565676c693132b08360a45fb9ba4362eb479597fe08872b6b7e213c6dcf3451be
-
SSDEEP
768:lfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:lfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 5052 omsecor.exe 2232 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 60 wrote to memory of 5052 60 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 83 PID 60 wrote to memory of 5052 60 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 83 PID 60 wrote to memory of 5052 60 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 83 PID 5052 wrote to memory of 2232 5052 omsecor.exe 102 PID 5052 wrote to memory of 2232 5052 omsecor.exe 102 PID 5052 wrote to memory of 2232 5052 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b9a39935d4b094a42592af4539240699
SHA169d545c43f0c93a4de7e383c4327113c44802e11
SHA2560d08986cc271728a41463a0cc81164834b216c29dead919320704db57e1ac5c3
SHA512e9bf5d903385d2e5fe3b2ff5b5fcbe67bef9a39fab2cf66115276c36a4aa8be891149c9ddd63bd9dbabd49b182fddd84aab19806a5ac0ce2d84ab09e4c8a11f3
-
Filesize
33KB
MD5c772fb08edd25dfc03fc0e8d14cc646c
SHA1b655df1113583e3b00db10183035ff2d694ea2c0
SHA256b24071087291a512823985f21f9eea8c3bfdd06f68b7e92c61201bbb27461d32
SHA5121be73f9a1116b4791b9c2e7a9c0bb7ad8817beb9e637a63c1c7b07e3ebd3e588213d129434b6c060675e221b429e0c1b8e1fc6d117d587e6fe41fd66b7168cf6