Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 10:04
Behavioral task
behavioral1
Sample
f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe
Resource
win7-20241010-en
General
-
Target
f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe
-
Size
80KB
-
MD5
c15d9fdf5c446b1c175a66be1ad84e25
-
SHA1
83c24c21624667175e4c8d5cac539312c75706e0
-
SHA256
f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36
-
SHA512
ebfb468ddc390972b7cfd3db666b52587a64112b633aab457368d02e0881cd505627f8a14f506ede91dc06a422c7e82950fb67fa3ac0c0e3694ec325b06180bd
-
SSDEEP
1536:Sd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:idseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3232 omsecor.exe 1680 omsecor.exe 2224 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 636 wrote to memory of 3232 636 f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe 82 PID 636 wrote to memory of 3232 636 f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe 82 PID 636 wrote to memory of 3232 636 f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe 82 PID 3232 wrote to memory of 1680 3232 omsecor.exe 92 PID 3232 wrote to memory of 1680 3232 omsecor.exe 92 PID 3232 wrote to memory of 1680 3232 omsecor.exe 92 PID 1680 wrote to memory of 2224 1680 omsecor.exe 93 PID 1680 wrote to memory of 2224 1680 omsecor.exe 93 PID 1680 wrote to memory of 2224 1680 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe"C:\Users\Admin\AppData\Local\Temp\f9f8076b87c8d6855ef682bbbdc4aebbaf1d8cff2d86be2ae1175dcc8e89ad36.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD56207dd7e154b89d9cba99a483b037158
SHA18b93588800064ba1c6063302bf9f20a02826f1f6
SHA256b1f8646e521a3547a8e91df3835e54e28206b5099c7fe2a7aca3f4a35dccb034
SHA512683c166631c9f99353c1af2090c5c0b79a57d2b89ceb69dcda77bf1c7e5cd30506428093ef0dcf885a9748ecc5d25d6dfb8be9e72771bfb67c08a549818efd20
-
Filesize
80KB
MD53529d1fcb7c41c92a37900381618d158
SHA19a9f8cfdd6f1366e7e4866f2ce5f5f39e3d05be2
SHA256deb8c3d0ac3937d9acd785511f560ef04a29bd5b664d282d47e85a28a8847f2f
SHA512037899757ba1722d2e5c1c0b1c3ffaf6c9ed022186db2b1e7cbaf74504dbe4fa826a16d9604f015a78c980a7fddb0cde88a9af224a279fdee22cbd30e0e92a3f
-
Filesize
80KB
MD582e3ff6394778954848f8c739ec6bcd0
SHA16701c70e4ec5eac9956256a02a2bfe1b42a26ff5
SHA256bf63c1712f2c76496c9d555108fc4f8c68719e13bb4aa21af3298d1d716fb181
SHA512330cb68c3a6927deac50124f7d731d579bf7521d6c5fd61210d98c2eb639f5b36bb685612a2f25fc7412654df53f2d34756615bd751b4001ff1ab3f2c26de400