Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 03:11
Behavioral task
behavioral1
Sample
2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe
Resource
win7-20240903-en
General
-
Target
2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe
-
Size
80KB
-
MD5
877a17ef2cd38227583444233ece0684
-
SHA1
89e4cec63d23f58fce25fa07595ae3d434605ae6
-
SHA256
2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed
-
SHA512
67ed4735109cce0dcecd5ec525ccf394ec470b6f152b59617b18a40b9d3a4c9d6491fa190c3eb3f28db89ab6e2c16426d8897d32272bc452470f69f9ac883f94
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:TdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1536 omsecor.exe 4756 omsecor.exe 636 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 384 wrote to memory of 1536 384 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe 82 PID 384 wrote to memory of 1536 384 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe 82 PID 384 wrote to memory of 1536 384 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe 82 PID 1536 wrote to memory of 4756 1536 omsecor.exe 92 PID 1536 wrote to memory of 4756 1536 omsecor.exe 92 PID 1536 wrote to memory of 4756 1536 omsecor.exe 92 PID 4756 wrote to memory of 636 4756 omsecor.exe 93 PID 4756 wrote to memory of 636 4756 omsecor.exe 93 PID 4756 wrote to memory of 636 4756 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe"C:\Users\Admin\AppData\Local\Temp\2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:636
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD54f38adac988ce006e4806a4846a0fd82
SHA144d239f0223e4f646cb88d3353d339454aacad60
SHA256ddf5724ed60f5b35478cea04daebcfbc08638abe2bf1635f624d92733a0db6eb
SHA5125ead065ea69f0fd635e7a5c45d98d3d370ec58d04aa8131489548cefb6c08c54c1fade96dac672b7351280a1db74ae01fb53f08b371566efef40e596e329449e
-
Filesize
80KB
MD5a7a5ca98e7bebdc3514439aa241cd0b3
SHA11c3bcc694dc7414e2477562cb75ef6dd8066372c
SHA25664da2fb5065e4bad9065c7524250227e24efa7b8b47f0818b111a1527f689eb3
SHA5127e9bbc1a300bc0dfaf19dfcbce78aa4f7101a2269da32a9445b5b9827cbd958e57a4b0acb9f60c1492dcea6d295c026859f9262da2fa9b23e5ae26e5ee8e3210
-
Filesize
80KB
MD5f8b020338b3a06f9c4e4313bfbfe42a7
SHA1b5fbcf7971b29bdcbced1c51e88ffcc084258cb4
SHA25672c9fc50b096e2c31761f2b7f001628207fb188b23bd1228604a8e2cf19d31fa
SHA512af51c51d0e7731a2f566aaa5d2582b4ebf0f4b679d2fcb693e3f7b901686602ee6ac73def4a637b885dadcf55ae283bb7e78f597b22a253e63b2fe3262d901ab