Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
Resource
win7-20241023-en
General
-
Target
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe
-
Size
33KB
-
MD5
72109d4d586848ae060ad7dcc5bd4c3d
-
SHA1
18a6cae894babf63e11965475f7ae09879dc6bf7
-
SHA256
90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb
-
SHA512
2959a64b07d0156d906f41c492cf2d37c5d433a98e602e005c2c445c5d866e0565676c693132b08360a45fb9ba4362eb479597fe08872b6b7e213c6dcf3451be
-
SSDEEP
768:lfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:lfVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1904 omsecor.exe 2548 omsecor.exe 2392 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3388 wrote to memory of 1904 3388 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 83 PID 3388 wrote to memory of 1904 3388 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 83 PID 3388 wrote to memory of 1904 3388 90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe 83 PID 1904 wrote to memory of 2548 1904 omsecor.exe 101 PID 1904 wrote to memory of 2548 1904 omsecor.exe 101 PID 1904 wrote to memory of 2548 1904 omsecor.exe 101 PID 2548 wrote to memory of 2392 2548 omsecor.exe 102 PID 2548 wrote to memory of 2392 2548 omsecor.exe 102 PID 2548 wrote to memory of 2392 2548 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"C:\Users\Admin\AppData\Local\Temp\90a3aa5372cc5b349a67c66b126d6a2333a86dce0a6ec0c9f691013b210382fb.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5b108a311195e99b42553d01ff34c10f6
SHA1e318fc1beb4eaa7e6f93fcecb47d202af1a7a257
SHA256edd268229b445c045ed0a3a61941774ee90d8ee708b1865fddf18412077e0bc0
SHA5126d988a9dd256b21b8c2f71faa166612d277c58cc5dee543a5557ddef2d2d328a5c2fcd807f778f1799ae66bfd5d9da2010f7ba2cb6532ebd24dbf8321231c435
-
Filesize
33KB
MD5b9a39935d4b094a42592af4539240699
SHA169d545c43f0c93a4de7e383c4327113c44802e11
SHA2560d08986cc271728a41463a0cc81164834b216c29dead919320704db57e1ac5c3
SHA512e9bf5d903385d2e5fe3b2ff5b5fcbe67bef9a39fab2cf66115276c36a4aa8be891149c9ddd63bd9dbabd49b182fddd84aab19806a5ac0ce2d84ab09e4c8a11f3
-
Filesize
33KB
MD55ab6d1435a46b7c57dce0d42f52b9744
SHA1ca155e003634ca35a9ea683498f72f125924baae
SHA256d3c483919d54982b1cf6fdd21c378abaaf10702c2ffdbe534ac00f20ec0ef688
SHA512c4c3fcb1b64795b44336b11acadede0b3e57f7ad281852bb67ecadc6a206d9931fe6f6bac2df3977b428fa65764bc93582adc315e21b836dff3e5e36ba77a01a