Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:08
Behavioral task
behavioral1
Sample
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
Resource
win7-20241010-en
General
-
Target
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
-
Size
61KB
-
MD5
59ada6b8a5b4b1d95057515b1872a6a3
-
SHA1
fb1ee815d23703c8182d9f2d4209d47678201cba
-
SHA256
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69
-
SHA512
3afaba73b5be8cc19a1c2ef5307af9ba8ebb5924233ba22ca8e9c3d2c302b15f0bcdab8f419151058f910144c16541f7cd1db66f5895f3d0a3c67d9412debed1
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/53:edseIOMEZEyFjEOFqTiQmTl/53
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1188 omsecor.exe 4964 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1188 1576 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 84 PID 1576 wrote to memory of 1188 1576 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 84 PID 1576 wrote to memory of 1188 1576 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 84 PID 1188 wrote to memory of 4964 1188 omsecor.exe 101 PID 1188 wrote to memory of 4964 1188 omsecor.exe 101 PID 1188 wrote to memory of 4964 1188 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD56353b341752d72e1d3571499437d9bef
SHA1f53b39ba778dcf7c52da3f42b15128068740787e
SHA25659e51d94da228aa8c60558f80760cc064c89b0f55c6b09d1d80ce2163c553510
SHA5125432b91ae7f2f9e8fbaf670c01506cb117e2d1c55fdffff01ee2f0f2b097b6ae851076541278ba99ef530e4f9c8290adec26ffb0868a99b23651c79de369076d
-
Filesize
61KB
MD50634e482c9905d4eef3bc02b30059936
SHA1e6f6d25851dc670ad15f2a40d2aac5208ae5f447
SHA2569684154f3bd287b657778a537e6a0894e4ca9a51a74e1d69e0d97325ed9f0720
SHA51297d56b043305523192ae6c0cf8359bdff2af43a18e93d387bc18277a4aee5ea176e58c9cf209c2df2df52b01918df82b66fb51b38a9b78a759bd450012c8786f