Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 11:07
Behavioral task
behavioral1
Sample
d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe
Resource
win7-20240903-en
General
-
Target
d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe
-
Size
76KB
-
MD5
5cc0cdf7bbc8751277deeda11a727f40
-
SHA1
05a026b8f2fe11ee58684bfb68f1d8c5416529db
-
SHA256
d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618
-
SHA512
4d1bf9fb3ce0a0bc94e051c5d22f70474e637bbe5c62bee20d1e5d94e1fa0166e75e23ed9777a4798683aac41290bc2fbced15aa5a487d6aec3d85eb28d52e2a
-
SSDEEP
1536:3d9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11f:/dseIOMEZEyFjEOFqaiQm5l/5w11f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4528 omsecor.exe 4132 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4528 4456 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 82 PID 4456 wrote to memory of 4528 4456 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 82 PID 4456 wrote to memory of 4528 4456 d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe 82 PID 4528 wrote to memory of 4132 4528 omsecor.exe 92 PID 4528 wrote to memory of 4132 4528 omsecor.exe 92 PID 4528 wrote to memory of 4132 4528 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe"C:\Users\Admin\AppData\Local\Temp\d5ae2a375ffb1f147db269960a541604c29dd755914d3eb022a8581d584aa618.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5562b7901bfb4334b3449e561adfafd19
SHA11de575b0b106328a4e9b6f06e9a2834a7b133bcc
SHA2565c26179f145419d124d38219240e31bff16a09e47217d3cb42e38ffe6fecdea7
SHA51231e4901b0880c6131cc745ee8782a6aceeaa747e6d393554cb7aef635556184e2a4dab468019a3d5600d7fc40c1e45119f52782ee8dafac14d90945b3ea32a61
-
Filesize
76KB
MD5db5176b29d28f1be3659dc4d8a886b68
SHA12e440c09aa78ef49218d92e41deb437e486c4623
SHA2563ba1b647354701198bc69cd75ffa0affeb226f23a008c3db15d7bea3fad783c9
SHA5122b85a1d2fd8434b92489875142688386d6b158ac3674aaa0aaf4babeccb1d2f886f7e1bae3ae1d132d047465b6a923d58df5a8e96ef5d23044b106cec3244474