Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 10:19
Behavioral task
behavioral1
Sample
fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe
Resource
win7-20241010-en
General
-
Target
fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe
-
Size
90KB
-
MD5
d6751aa4248926f54bc9588bc65e4a1c
-
SHA1
3715e109a6275482254c3f0913eda579110466be
-
SHA256
fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629
-
SHA512
1a97366ab41e8ad1a13396eb95d6018487f90f2fab668dd3cfe9263a807de6154cc6e12b6c5bfbea481825087ea639dcc4695ea3bb38028e7a39d214c62af2b4
-
SSDEEP
768:FMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uA+:FbIvYvZEyFKF6N4aS5AQmZTl/5W
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1788 omsecor.exe 548 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1788 3644 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 82 PID 3644 wrote to memory of 1788 3644 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 82 PID 3644 wrote to memory of 1788 3644 fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe 82 PID 1788 wrote to memory of 548 1788 omsecor.exe 92 PID 1788 wrote to memory of 548 1788 omsecor.exe 92 PID 1788 wrote to memory of 548 1788 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe"C:\Users\Admin\AppData\Local\Temp\fe23843310c26dfb7f5f92e758180ab136b515fd66c63dce892371b08dc7d629.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:548
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD57d3a37876afdb630ef3e8d18bace8aec
SHA10d4d8887804aa168bca57e0842fe7df2752a21fc
SHA256240ac3b87a133772d045e0de7096db649ea1a7c6dfc849cdfa0ae0a7e4f95e6c
SHA51277464004e1541de33a738956757c2b9622f2221d5712ec0349339cfaea13a2c6debb7241f96a6f5a3c7a83d2994bd652cf02213c5a2484e53545605c321044e1
-
Filesize
90KB
MD5d82eec30921e57514fb3fdf79f835595
SHA154fef225430632f5aa79d8ebe61696b3b206faf4
SHA256a311c74ff77d96dd22598bb99c274a32e065b1abff4ed6fc4f37032c90f4cf82
SHA512d0a639a384bfb523809482b78557618f40296a219edcc1fbd030b42753d204da9d1b1e8c0b049d7e7128c47fce8e9352bcd66628470dfc8378c2b2b9cdc7ede7