Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 18:35
Behavioral task
behavioral1
Sample
7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe
Resource
win7-20241023-en
General
-
Target
7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe
-
Size
76KB
-
MD5
69283bb5bc570089d169328e822ac0e0
-
SHA1
f124019a4ccd967b4a91dafce59097ef6d845850
-
SHA256
7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799a
-
SHA512
14306466426455e85d9805d509a89c5809c836a87607742b0bea83873831736544ded10e2779f808185cf8d976be2f999093fc5643e0616858b1c64c0447333b
-
SSDEEP
1536:Xd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:fdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 60 omsecor.exe 1404 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4600 wrote to memory of 60 4600 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 83 PID 4600 wrote to memory of 60 4600 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 83 PID 4600 wrote to memory of 60 4600 7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe 83 PID 60 wrote to memory of 1404 60 omsecor.exe 100 PID 60 wrote to memory of 1404 60 omsecor.exe 100 PID 60 wrote to memory of 1404 60 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe"C:\Users\Admin\AppData\Local\Temp\7221f5495948d5f28e42a280b0a92a6c8f407052615be38f88019a78ddf4799aN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1404
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5754f7742e64098569ee4c4d15fdccb84
SHA16fe048c9d1ed5337b1b65cd0f641a71eeda9c1dd
SHA2565eefff4b213b342ced4d42b1748700c0682b3f30d27d38d406b731980f19e7cd
SHA512a8ac38f30108740edc1df7a1fc690111112dc1191b92a26b5c69d07cbe86f706b9cc8c6ee5b845a93b69e9355aa2b3e321ba1d481a4e4754c16ccab7e32a9331
-
Filesize
76KB
MD5a30fee7e8d070e9f08619b667606616c
SHA1ee25476ad31ddd62aec7dbb867591582acc91b2d
SHA2569216592a780036eed24732c3f28e9f176fb5f12967fceb94e8769efc495f8ea6
SHA51215b38f527305b2157c6a460622ddb0d2264371f801a6b168945fab54efc629d6e43c47aae915e143c86c971b13210c8380614e1a1e25c02a2ac6e3fe8869f486