Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 22:10
Behavioral task
behavioral1
Sample
2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe
Resource
win7-20240903-en
General
-
Target
2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe
-
Size
80KB
-
MD5
877a17ef2cd38227583444233ece0684
-
SHA1
89e4cec63d23f58fce25fa07595ae3d434605ae6
-
SHA256
2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed
-
SHA512
67ed4735109cce0dcecd5ec525ccf394ec470b6f152b59617b18a40b9d3a4c9d6491fa190c3eb3f28db89ab6e2c16426d8897d32272bc452470f69f9ac883f94
-
SSDEEP
1536:Td9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzr:TdseIOMEZEyFjEOFqTiQmOl/5xPvwv
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3424 omsecor.exe 456 omsecor.exe 2224 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3424 3260 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe 85 PID 3260 wrote to memory of 3424 3260 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe 85 PID 3260 wrote to memory of 3424 3260 2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe 85 PID 3424 wrote to memory of 456 3424 omsecor.exe 103 PID 3424 wrote to memory of 456 3424 omsecor.exe 103 PID 3424 wrote to memory of 456 3424 omsecor.exe 103 PID 456 wrote to memory of 2224 456 omsecor.exe 104 PID 456 wrote to memory of 2224 456 omsecor.exe 104 PID 456 wrote to memory of 2224 456 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe"C:\Users\Admin\AppData\Local\Temp\2b77d1a84b988d7648580aa4348c2416c485508941b6e60a31b17fe42915beed.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5d393c1605779fad14803a0548f10d52c
SHA1c469157d9ba351446d8196914eae224dc616eeda
SHA25653f124af87996e679f2f3812d7913cb1a19cf66cb4698099f2070cbf1791877e
SHA512967124b2a3f97e47f137aaec7d687e349c6cb8db9177b5471cf21ddabaf03412cc5e13025cda7e8a9d9be64948e86612ad68825c55d8e1a7eb8ce9648f1d8a62
-
Filesize
80KB
MD5a7a5ca98e7bebdc3514439aa241cd0b3
SHA11c3bcc694dc7414e2477562cb75ef6dd8066372c
SHA25664da2fb5065e4bad9065c7524250227e24efa7b8b47f0818b111a1527f689eb3
SHA5127e9bbc1a300bc0dfaf19dfcbce78aa4f7101a2269da32a9445b5b9827cbd958e57a4b0acb9f60c1492dcea6d295c026859f9262da2fa9b23e5ae26e5ee8e3210
-
Filesize
80KB
MD5cbfdb8ad206fe8de660bb6c03b95e60a
SHA1c9601c8593d0b2b9dd6657883529b29d5c5685d2
SHA256be916527894acbd82ab99a8c09c5c511669a15b261f21801b497c4ed504b66ea
SHA512c41ce1a5f6da863ef6dbbfbd793c5e4fc6d9f392c6152c763e4d1974af00f48b9aac0712b683bf643510233e8e603b3ee371183cb4dd871928209b13e6deb5dd