Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 05:29
Behavioral task
behavioral1
Sample
f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe
Resource
win7-20240903-en
General
-
Target
f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe
-
Size
76KB
-
MD5
4447ea922b2b000f75a49c8adadcb6e7
-
SHA1
cf5eb0b0c8d43f834ba112a93495f1bdfef41220
-
SHA256
f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8
-
SHA512
f43ea8dd067d074f70e84bc2beeadd1d3bdd8417cfec32ca068282e5cfa2abd56464ed1b4d74443d4577053d01fac199042332d93adaa6b95346b86ee1dcc5a1
-
SSDEEP
768:aMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWZ:abIvYvZEyFKF6N4yS+AQmZTl/5OZ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 728 omsecor.exe 1388 omsecor.exe 3984 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4112 wrote to memory of 728 4112 f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe 84 PID 4112 wrote to memory of 728 4112 f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe 84 PID 4112 wrote to memory of 728 4112 f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe 84 PID 728 wrote to memory of 1388 728 omsecor.exe 94 PID 728 wrote to memory of 1388 728 omsecor.exe 94 PID 728 wrote to memory of 1388 728 omsecor.exe 94 PID 1388 wrote to memory of 3984 1388 omsecor.exe 95 PID 1388 wrote to memory of 3984 1388 omsecor.exe 95 PID 1388 wrote to memory of 3984 1388 omsecor.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe"C:\Users\Admin\AppData\Local\Temp\f8ef32d15ea9973e8e0cc584c6a01a85de54fc32e528858f3ba54b50705871f8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD52b70e934fb17433f26251ae73f0819d5
SHA12361d2ec60a0d0fe1529d7b33a1daceaa04baa33
SHA25697b67f4e4072aef1a485a3824a42c151c702506786124e80a4ba45f8984f75de
SHA512a5d9af4fd194a753caa18aa696f335111b785217ae382831b589860e4da2fc22a5bb3e62033d0b9ae65437a30a3191ecceb2c6119d042f81ebac323fe92ebab9
-
Filesize
76KB
MD5831abdbc29464542f622700b4864082e
SHA1333ba113ef3c4570e40abdc37438ce7553beedb3
SHA2562a4c8e8edb3282080cf36bdf3069d106bf4e981f38a4ef2c1bd54d0f81d1fad4
SHA512f3051f82952af902390d074505d7931edb06a876ae3d7b743ca4f9c8915c769eed169ca1476f2338b4983dd6a3183e11dc93b36d326f5cbf2d5f22849d982f95
-
Filesize
76KB
MD5f55b2bb373ca7b1f055cae1816847c4c
SHA19136ea8d2ecd8933c0a66d36e2c3e37405ad6233
SHA2563cfaf9f89217e2807972e5c2a28df5f69b649301cd13d3d249b5c05152023be8
SHA51286d03cfecfc10b40b38983a291c43a9918531906c4b4fcfae87958047bf8a34cc0552a90d5ef83563fb706dc50416335d64efb486f3a8222c99eebd9fd0da2a4