Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:11
Behavioral task
behavioral1
Sample
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
Resource
win7-20240903-en
General
-
Target
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe
-
Size
61KB
-
MD5
59ada6b8a5b4b1d95057515b1872a6a3
-
SHA1
fb1ee815d23703c8182d9f2d4209d47678201cba
-
SHA256
b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69
-
SHA512
3afaba73b5be8cc19a1c2ef5307af9ba8ebb5924233ba22ca8e9c3d2c302b15f0bcdab8f419151058f910144c16541f7cd1db66f5895f3d0a3c67d9412debed1
-
SSDEEP
1536:md9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/53:edseIOMEZEyFjEOFqTiQmTl/53
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 836 omsecor.exe 1916 omsecor.exe 3476 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3892 wrote to memory of 836 3892 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 83 PID 3892 wrote to memory of 836 3892 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 83 PID 3892 wrote to memory of 836 3892 b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe 83 PID 836 wrote to memory of 1916 836 omsecor.exe 100 PID 836 wrote to memory of 1916 836 omsecor.exe 100 PID 836 wrote to memory of 1916 836 omsecor.exe 100 PID 1916 wrote to memory of 3476 1916 omsecor.exe 101 PID 1916 wrote to memory of 3476 1916 omsecor.exe 101 PID 1916 wrote to memory of 3476 1916 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"C:\Users\Admin\AppData\Local\Temp\b01d3869bb2b2e01eda73d36b400c26411e1c883efcb281d2d4840a3fdd37d69.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD58f67a03ab7f2d32e1d7377cfc2e08fc3
SHA1cb073edfafdc5b5f6728ee3e5cba1586b5c24352
SHA256bd294858404c4370e87f4af032c3490a76ee88a2c6125623f07357b8b19c20e5
SHA512df6eac7b63f9bb144348c91b8b2a750c3a568ea6bb179f78ad88ea6778df57b04f00008e8f2f898904824f1c06f38cbf627e09181adf0a52b79c868b0996b1f2
-
Filesize
61KB
MD56353b341752d72e1d3571499437d9bef
SHA1f53b39ba778dcf7c52da3f42b15128068740787e
SHA25659e51d94da228aa8c60558f80760cc064c89b0f55c6b09d1d80ce2163c553510
SHA5125432b91ae7f2f9e8fbaf670c01506cb117e2d1c55fdffff01ee2f0f2b097b6ae851076541278ba99ef530e4f9c8290adec26ffb0868a99b23651c79de369076d
-
Filesize
61KB
MD5183a7ece79897472e0f9b9ef43a4e710
SHA1434187f9e9b96b3fa80ec99a93dbe0a2f581f7b3
SHA25639c9a6135f15daf61a6c3f3eec69d618139052c186a91c7ea4c6800eef3ccdd9
SHA5125b62c115c50c619982abf5a6923491154cca0f2ae69bdeebfcc08ec3f56e3c0f3d216988026825085fcff069548d01a0e095b924e27be5e87dbb545e83f7219c