Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 09:06
Behavioral task
behavioral1
Sample
075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe
Resource
win7-20240903-en
General
-
Target
075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe
-
Size
72KB
-
MD5
882b21ffea45df06e8d491977cc09462
-
SHA1
4854d5ce9493caa4951194c1e467d048f7217e09
-
SHA256
075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f
-
SHA512
facd894cb976006124b2de29886b2e47d147addd4fba162e18a3126f02aac74acbe4bf63edafc6011376a1b9e09f3da351a114c1225fea2a0fa4827802018f37
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211H:idseIOMEZEyFjEOFqTiQm5l/5211H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4944 omsecor.exe 4608 omsecor.exe 956 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3740 wrote to memory of 4944 3740 075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe 82 PID 3740 wrote to memory of 4944 3740 075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe 82 PID 3740 wrote to memory of 4944 3740 075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe 82 PID 4944 wrote to memory of 4608 4944 omsecor.exe 92 PID 4944 wrote to memory of 4608 4944 omsecor.exe 92 PID 4944 wrote to memory of 4608 4944 omsecor.exe 92 PID 4608 wrote to memory of 956 4608 omsecor.exe 93 PID 4608 wrote to memory of 956 4608 omsecor.exe 93 PID 4608 wrote to memory of 956 4608 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe"C:\Users\Admin\AppData\Local\Temp\075edd3335fbf4aab941b41eea8c89fb25d2f0afe11728a353947a67681fa90f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:956
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5eaaf978fdf8d8db549b8ff9851e0d67b
SHA1e76f47deabcf316ccab88b40f5d0033c2e27c2df
SHA2561628ae8e50ed4c9d4a61b0f4bfa1b087425f889e0b3dc14fd537411ce5dd92b3
SHA512eb25cf3c79ed7e5c8eb059dc7bd9604b1c268d1e54444c668a69d7202c7feaf8684cf8fda8f190fd75371dcbcb9d043cb08500c33077da4f8dc4b47146e73001
-
Filesize
72KB
MD5fe00dd342ce292e20406caa85f468f37
SHA1df441dd313753bca7d5043779a6ba69234ca24de
SHA2563bfebeeefac381664e1e956a1e164ccc7e40f29ec6d7ac6992e15b912626f29d
SHA512640ee7293a109a36b8ad6ac0bcedbd57c5bed60393582c204935f40f599aec16dacb48708119dbc70513283090490e017119d4a2f663f0fc7e1a04edf747a3dc
-
Filesize
72KB
MD5e30cbe2d3499c7e2ead65cefdaadfc5c
SHA1ec32c34db01df17318e97b3debebc69b5dd6a6ed
SHA25691b3adbcd0bf94c4bfa877938f376cae06e34d5bbf82b444f0b9f23d924c156e
SHA512e8dc8f800f375c85348eee0b0e5dfae012ff7cbe594c9903198eb2f1b9614d18d89fe434bc26bf27bc754c35506d242e56b5277297a46e3888176152342bd82f