Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 06:49
Static task
static1
Behavioral task
behavioral1
Sample
6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe
Resource
win7-20240903-en
General
-
Target
6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe
-
Size
33KB
-
MD5
6f107f9388e03d5e39dc8906e8366f80
-
SHA1
5954de46cc556f71eed5d3567fa1016f749a604b
-
SHA256
6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4c
-
SHA512
cd9e8f20d6daa33d1f60edcfdcfedd501aee6c9514aa53c26cfba4e6d089d9d8d410cc4a7de41c26a6841caff394b267b8248764abf4dbb11dd6b608b7c54038
-
SSDEEP
768:0fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D:0fVRztyHo8QNHTk0qE5fslvN/956q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3248 omsecor.exe 2264 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 508 wrote to memory of 3248 508 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 82 PID 508 wrote to memory of 3248 508 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 82 PID 508 wrote to memory of 3248 508 6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe 82 PID 3248 wrote to memory of 2264 3248 omsecor.exe 92 PID 3248 wrote to memory of 2264 3248 omsecor.exe 92 PID 3248 wrote to memory of 2264 3248 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe"C:\Users\Admin\AppData\Local\Temp\6f9b3a2b5396a661f1b197fdceb44356efafe40452dbad3d7f533ea3c56afa4cN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5951e6b40c78220b42e1121d9eb977422
SHA1e9a3eb6cb3463ae2681b6406a7cd2da255d2b046
SHA25680785cf952ac62548c184edb73d85b3a0f237f4bee44ee258e7232c8d1e75e6a
SHA512862aaf5f83b0e2b2fc8473a920b55f1c4962d862bd4a482fa224cdb8e436a7d34105e4d2a985e25a031f570c8bdfc99e1a553c31f7cd050377bd8c6b12688182
-
Filesize
33KB
MD5d7cdad9fb3ef86a58c59ff325a8be349
SHA18a8f18f9c9ad8cb8a429e58fda0d06046b5586bc
SHA25667bed600d8ea01027d14ee2217c44b7027f85f53dfa1e1f146b76cd7c5f54d50
SHA512e320ee89f23ef1cc3e0bf02d130843e9d875e18dfaffc004225ff4f2bb93f842dcf8ecdbfc746c031c3479826ab5c920958ddda864b978f24cccfcc78be265c8