Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 10:52
Behavioral task
behavioral1
Sample
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
Resource
win7-20240903-en
General
-
Target
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe
-
Size
88KB
-
MD5
089bc9c981a81ab3357819a123e11bf0
-
SHA1
387367183e3447e5bc9cb0cb05fd59cbe7631baf
-
SHA256
fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362
-
SHA512
74938d6acf14e1f50f1d254e5de8dc19af4559b7cd11ee0a8a8e00a2ac488656862bcee8f931295febbc6476fe53718beccaf9f87a96a2ee0b2b4b7bae509209
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:RdseIOMEZEyFjEOFqTiQm5l/5h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3904 omsecor.exe 2788 omsecor.exe 4860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3904 2884 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 82 PID 2884 wrote to memory of 3904 2884 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 82 PID 2884 wrote to memory of 3904 2884 fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe 82 PID 3904 wrote to memory of 2788 3904 omsecor.exe 92 PID 3904 wrote to memory of 2788 3904 omsecor.exe 92 PID 3904 wrote to memory of 2788 3904 omsecor.exe 92 PID 2788 wrote to memory of 4860 2788 omsecor.exe 93 PID 2788 wrote to memory of 4860 2788 omsecor.exe 93 PID 2788 wrote to memory of 4860 2788 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"C:\Users\Admin\AppData\Local\Temp\fcb2a7077fae9a4924d783f7cc711fb173a01a4ebe441a47662a5c942fe27362.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5f3c1922a11d56690e7d521c278c54975
SHA12625a421897ec0eaf3dbc2906919f94ca9cc9aa1
SHA2569b4904324b5943632408e757ebfcfb7958d66590871e21d08669eb837b105b4f
SHA512d5f51e69c1702b1c333807c9ded332a3742fcb9a0184192f9af81607d5c194937da1381eaa8eeb8e3a6a1fb58293429ea1b7d732bddc0ab2b6bcf38a4b535acf
-
Filesize
88KB
MD56274ecdc91c6bbd397d93bb6a5ceb6a4
SHA13316484db852f34636a6bca9f7bb8aeebe46cba3
SHA2565b8d5b0e4f89163c1e179e426d66587fbeef7b6bcdfba25c084a26b117cbad1f
SHA51279e71c9f6b5aa7637750c2f6d3172359f8caf4fa2f0e5bedf0ca9d2233c72f5695f17a5c6567f689df0daf101bc190ca88c94763cbe9ffe6dea3f9de481fc144
-
Filesize
88KB
MD5c5c0e7a89aa7c5aa6a696c75b5ae467c
SHA138a85223a8d44d23dc31a78b28fb473a65bfbb43
SHA256521bee37118b3974b8926437a0fcf9e3efbb7e42ed7c2f30603121b1d6aa1656
SHA51263642930555d50592433b0d5c74a8d539741d11745f5e4e932b208a220e6adb015e7605d5cf119f77fa8f37c2316cdbdde782156c48bfad254c7a7a0f58db3b0