Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 15:29
Behavioral task
behavioral1
Sample
33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe
Resource
win7-20240903-en
General
-
Target
33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe
-
Size
76KB
-
MD5
0c1a28fac6dae204a0b3fef41653590d
-
SHA1
651bf9bc7ff22bf654749fe299fc2a5d436da11f
-
SHA256
33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9
-
SHA512
8d3f833a226ae3993291f701c8d647243ddbbbb4e4dd128f11741315fb61bda0c072e339aa1c48a21ed3b25a7914d9b5094fd844c145a8e320a1439617f99765
-
SSDEEP
768:p2MEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWR:kbIvYvZEyFKF6N4yS+AQmZTl/5OR
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2040 omsecor.exe 876 omsecor.exe 4336 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2040 4712 33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe 83 PID 4712 wrote to memory of 2040 4712 33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe 83 PID 4712 wrote to memory of 2040 4712 33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe 83 PID 2040 wrote to memory of 876 2040 omsecor.exe 93 PID 2040 wrote to memory of 876 2040 omsecor.exe 93 PID 2040 wrote to memory of 876 2040 omsecor.exe 93 PID 876 wrote to memory of 4336 876 omsecor.exe 94 PID 876 wrote to memory of 4336 876 omsecor.exe 94 PID 876 wrote to memory of 4336 876 omsecor.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe"C:\Users\Admin\AppData\Local\Temp\33ee33ca3efdaa78aa766b63d837accd4c4cbc69f4c8b4f0a1cb249b5e6f2cc9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5093a6b45f5134ba6922013bfbca4ee93
SHA121fa4b285805fd4a1f499e35e4c034c24f5edeb6
SHA2562253a95c8316585e8579189a602d0f96056a2c566e742123a47551022fe3169c
SHA51243f5d5018e11f5113730313d08db04976717c782cc72838fc2d47f0d7038c3e3d7c37c8bbef7f3103f6539dadf00e51521540542586867c48e79506251734de1
-
Filesize
76KB
MD5adeba10e77430d7e008667a3e80522ad
SHA182bfc54cd19405f6ca615e3b3381b7157c4264dc
SHA256dbf49fe5d56689c32c4e49f530b9a7ff1a06fd1e40666d7c9c18a0f21e7b9af6
SHA512ea83d3b6f255c12f6daaf46528e61e9bc65bd4daf5670b75038105981ba6d0ca53ca8d0e42e54fe0891b6f231316e92dabc5cf0cc7e7f8841d69edd97bf5e39f
-
Filesize
76KB
MD51f0185522001158beae0c1a0b0d31f8f
SHA1573829d1f7f5776debe0798c996f303838083e55
SHA256da11df9fc43ac8ba2f923711104fd6467174111ae1146ff590387b8a84b426ac
SHA512fc37b9a57832879139e85cbd621308fdea151ac0338a24f06048692ee36744fb7cc6afb82e1fb4b150c85d55ec9d014dceb13d1add505ec5816ee3ae2f00f743