Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 22:33
Behavioral task
behavioral1
Sample
3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe
Resource
win7-20240729-en
General
-
Target
3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe
-
Size
76KB
-
MD5
91d953c044dc1a1ef649690528fa0c74
-
SHA1
52bbf9c5d6b2b50ba1bd14b4b3057919b71d06e7
-
SHA256
3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871
-
SHA512
2ac2eb673a07c86629b9da68f20c8362d1f27070f2cc5abb703dd507fc476c3f36da055fea9019cad27d63bf8e917a42760232a94a76eb93249fb202f8435a39
-
SSDEEP
1536:kd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11H:cdseIOMEZEyFjEOFqaiQm5l/5w11H
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4520 omsecor.exe 2624 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2604 wrote to memory of 4520 2604 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 83 PID 2604 wrote to memory of 4520 2604 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 83 PID 2604 wrote to memory of 4520 2604 3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe 83 PID 4520 wrote to memory of 2624 4520 omsecor.exe 100 PID 4520 wrote to memory of 2624 4520 omsecor.exe 100 PID 4520 wrote to memory of 2624 4520 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe"C:\Users\Admin\AppData\Local\Temp\3615079a1b3478df057957fb56d1e45250fbcfa842b3f5bf05d16c95e8c2a871.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD52e114bc1cc17202f90f7522e5e066560
SHA192b3f4b450e46a618c52890a803bd04d718ea3d5
SHA256ae47be47dc96de4bbdbe84f446bfbc0476760e20a3bd6b15734db7c2d28e7942
SHA51238c6a3654f328e6e40b81cf57f52cc79a771a423e4e229fd58bedda2fbc2a9f4eee96984499b87bfadbdcbe5fc519068791d8d6a1f21e3115d12d21b59d2d62f
-
Filesize
76KB
MD5850001ee276065b6a4009379919c9fc5
SHA1b368cf58494c8970ebbf1d9479d249eecf35c29b
SHA256512fec580932c0a22e0a08a3c8cfad8d8edb733a10d27abbd57c3a581c71347c
SHA5128509dd5066169918a48d575e7c440194bd22c9bc5861801e56e89fc1e3a52c3632bb302270ef1ff82b8eb78bb504a8322fd0ade773ec88a5a64a90cae812b88c