Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 13:39
Behavioral task
behavioral1
Sample
01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe
Resource
win7-20240903-en
General
-
Target
01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe
-
Size
76KB
-
MD5
2582580e003af04158331b15b1cef3e0
-
SHA1
857f948c5a1913b5e3b13c310c0ee2411d771670
-
SHA256
01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162
-
SHA512
d02e96d347d0511717d3805a08e63a1c6d287e116e1761c06913f5a1644b8e0aa9cf4cf62500ecb2b49c3f52c9c2deb59ade29542dff69ee74208ff1f82c870c
-
SSDEEP
1536:9d9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11:1dseIOMEZEyFjEOFqaiQm5l/5w11
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2248 omsecor.exe 1684 omsecor.exe 2980 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3292 wrote to memory of 2248 3292 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 83 PID 3292 wrote to memory of 2248 3292 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 83 PID 3292 wrote to memory of 2248 3292 01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe 83 PID 2248 wrote to memory of 1684 2248 omsecor.exe 100 PID 2248 wrote to memory of 1684 2248 omsecor.exe 100 PID 2248 wrote to memory of 1684 2248 omsecor.exe 100 PID 1684 wrote to memory of 2980 1684 omsecor.exe 101 PID 1684 wrote to memory of 2980 1684 omsecor.exe 101 PID 1684 wrote to memory of 2980 1684 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe"C:\Users\Admin\AppData\Local\Temp\01deb13b077a3f409d733aa1f02e20e66c161a8c67bd6f52a0874d2ba8c2b162N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2980
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD529a473bfa64216c597f98013a67f03b5
SHA15f13dc6a6e17fa16b4c0afed8d7ac6bbe63406fd
SHA256b890acae4cf9fd5141c52342f8eee68a9fea86ebff67b928697fd45c56f1900f
SHA512893785ed33b14f1296423f9c30fbf53877212f98bcda760dda4a7ea2ba0179956fe777b8799908700802820aeb620a3af3ca64dfc9a6f1e9d1f019c39b2b73a4
-
Filesize
76KB
MD523cadb559ce898e633546d41184c1527
SHA1e92f4a90953e4b180c6fb05fd64f127be11e82c1
SHA256ac28312c7d7703de7f29930fd86e6888fbb84027f54be42bbe2c81afbeb9c3d9
SHA512d12860890488c0a3938951f587bfde94d4195165f521c0f171fcb90abd78bf38159f2f9d0427637a1be8a13c8e9c7c40de20161991483564bfb3ca70260a2c7f
-
Filesize
76KB
MD57e089a9e376fab4330b066738236f3e5
SHA18a2e078189a0671db6a15d423732031e062e4917
SHA256da38b8d9ec2dc1ea944708f84a8facf3c58a1bbe79f1516b43207767f083cb2e
SHA512bcdc752377cf5a4a1e436da8cb371986a12d863e9fd15ad855fa744f10509ebeae8f20e4ac5ac1cd5d702a4a00bb7653847ab6370e56b420540cee2f01cc2f41