Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 19:41
Behavioral task
behavioral1
Sample
6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe
Resource
win7-20240903-en
General
-
Target
6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe
-
Size
76KB
-
MD5
924adf3a4133b8454a9fffa391a51580
-
SHA1
13b2b4c5bea687a6c30f546b8c368d156725843d
-
SHA256
6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943
-
SHA512
298c672e19e809a115e7f7c086e88c7f419aa88305e064096e4c2490a8b5200545e69e2ba0faef2b3221cf0b3ab5459797436188293eef1262f92b81ef4a0d7b
-
SSDEEP
768:aMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWb:abIvYvZEyFKF6N4yS+AQmZTl/5Ob
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3744 omsecor.exe 4852 omsecor.exe 4476 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3232 wrote to memory of 3744 3232 6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe 82 PID 3232 wrote to memory of 3744 3232 6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe 82 PID 3232 wrote to memory of 3744 3232 6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe 82 PID 3744 wrote to memory of 4852 3744 omsecor.exe 91 PID 3744 wrote to memory of 4852 3744 omsecor.exe 91 PID 3744 wrote to memory of 4852 3744 omsecor.exe 91 PID 4852 wrote to memory of 4476 4852 omsecor.exe 92 PID 4852 wrote to memory of 4476 4852 omsecor.exe 92 PID 4852 wrote to memory of 4476 4852 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe"C:\Users\Admin\AppData\Local\Temp\6c7d73857c1d2c7c21d700cd3b994834f71c948080c438fd4f92156f30cb7943N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5f6a000da092d967f5cc002378e964f1d
SHA19bdee4228fa9eae2c289ec8a61acbf16bd375a74
SHA256c652fad13057daec64ff9e9fe3a6bb1d025b9089277c836bf39d15db6c90d854
SHA512c67fd9117586795633f397e5497b598f6b0322e8751ec8e2e8830b26c2ff2fcba30b3f5bc4ef8b5ae138c778a4d04a8b05ced0cc5d474fdbe7d54dc5f9329226
-
Filesize
76KB
MD5c8c8c9542d0bb7a8ca2a12088a3561fe
SHA19e4ce13a2f6f9228a3f9db70f9cd74178598ac64
SHA25692662463897f049ea77a8291755ba0ad49ba8836d5351b7f2aa04112a81efc04
SHA5125076adc44a15466dbf65dd34704bf42e2e548b13880ca7cfadd8f677cd6a513fac981d5ba8859ccec6edabe175daef313c17bf5a22e8077a6bd998801fea4704
-
Filesize
76KB
MD504b01fc818eccde00efce5073170eaab
SHA1dcee94847f15cf61cec30a701347b78ec6db4f17
SHA2566d72b6c120e7f182bc70471de61fd79c6ec01482d0263fa5a7b5022e8be1c037
SHA512a25766ba10a4678efc93aa08ef618b8f17809f7c3660df29732d4ce1b0b5f116662d9aad9e57fba8a71442f072fb6016bcc5eb2a17605d179d64c215b82691f2