Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 02:40
Behavioral task
behavioral1
Sample
756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe
Resource
win7-20240903-en
General
-
Target
756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe
-
Size
61KB
-
MD5
8e3f6e1752bd2edfac4e3513c57d8389
-
SHA1
94d27ce598f52398a8e45901151744eb4e70a7d2
-
SHA256
756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31
-
SHA512
f061755a6b6676bdcedcb21df81238e1ae521fd3c81cf8142f6d532027192682b9742931e02b8312b75985d94425399657836c19379ba1a432212e9fadfc91a5
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5:7dseIOMEZEyFjEOFqTiQmTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3992 omsecor.exe 4240 omsecor.exe 2600 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5064 wrote to memory of 3992 5064 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 82 PID 5064 wrote to memory of 3992 5064 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 82 PID 5064 wrote to memory of 3992 5064 756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe 82 PID 3992 wrote to memory of 4240 3992 omsecor.exe 92 PID 3992 wrote to memory of 4240 3992 omsecor.exe 92 PID 3992 wrote to memory of 4240 3992 omsecor.exe 92 PID 4240 wrote to memory of 2600 4240 omsecor.exe 93 PID 4240 wrote to memory of 2600 4240 omsecor.exe 93 PID 4240 wrote to memory of 2600 4240 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe"C:\Users\Admin\AppData\Local\Temp\756ac1dbd787bd17c8edc4f85c213225836e3e4e4f6f6ee9081ba42594e21c31.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5cc38694a9034bb6df302814b6193f016
SHA14b08aa156d0f88b792cffa88ee91e9096059f38c
SHA256002419fd4a38e98c6d3f8bc6e85bec799340fcc918ab5c99ecb1cba4f016d3fe
SHA5126b0952a95248cf5408e3d92e3128acf6f6b114e3b9541e39b0c4aac621142a3da1a142970c6a79282935c59af602b47415046468acfccd9acbba6331edd3d1ea
-
Filesize
61KB
MD5f87e7731cff76a303f2775b6f814ca83
SHA1f9af87f2b3d91340c4b63d9f719e968005d89a50
SHA256e0d0f8c6487cb5c4ea31f5b6c1f76dace55003b30330e634570068526689407e
SHA5121cae476a58d8a0aa56677ca70ae4ab19e3a12a088e14ac32e992ad8c4432cbfa8ee6ff9e897e7a72b9a44ade55e0bb39b2770711d0296fb5f6dd72afecf4a613
-
Filesize
61KB
MD57458da33f4e094d247254d64a75aca8b
SHA1246408274e6cddaae55284be5b629fd0742eb5c6
SHA2569f7d2f7078cea6d9a0b790b6942831ff854f9498f4267db577bb9cd099a145e7
SHA5127071567928837d2bf5bd1967b5e00901841cccd9c85a9b6ce4ceba66f492743559184bbc84bd931adaf3fb6758a213d6fb8d687eb07ba433fada0707923a9e57