Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 12:52
Behavioral task
behavioral1
Sample
8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe
Resource
win7-20240903-en
General
-
Target
8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe
-
Size
72KB
-
MD5
a843ddbe4db478bb7c3404305737eab0
-
SHA1
2e26eeb05425b4cc5759eef5360b1a0d82d75261
-
SHA256
8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbe
-
SHA512
86530109b85abbe72ece65ddd9f8ba874413975565b16b6d2d52b873a0efb21d6bcefc6dd6f5da154684af01f338ff5c7588fadf063b8359199ca6cc78149860
-
SSDEEP
1536:7d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211P:LdseIOMEZEyFjEOFqTiQm5l/5211P
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4716 omsecor.exe 1932 omsecor.exe 3912 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2980 wrote to memory of 4716 2980 8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe 83 PID 2980 wrote to memory of 4716 2980 8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe 83 PID 2980 wrote to memory of 4716 2980 8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe 83 PID 4716 wrote to memory of 1932 4716 omsecor.exe 100 PID 4716 wrote to memory of 1932 4716 omsecor.exe 100 PID 4716 wrote to memory of 1932 4716 omsecor.exe 100 PID 1932 wrote to memory of 3912 1932 omsecor.exe 101 PID 1932 wrote to memory of 3912 1932 omsecor.exe 101 PID 1932 wrote to memory of 3912 1932 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe"C:\Users\Admin\AppData\Local\Temp\8033a4f67f819651529979ba6e7fcba5e8f517b5dbef4c5cc598a6ec8ea3dbbeN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD54b5698dae13489fa2e45553ef8c16c29
SHA14d7979592f8ea9f7b00f85383a964b31e0c73978
SHA2562a94169b38f0fbd1a102725e96aa24af4618d53921c1fd14c0ca07e88806ee60
SHA51230b405a7d78de4fd43327a8f14381fabd8c882926abeeeabee0645d749aa59d47ace71c48c0a47c8eca02a944af0bd64e6e2201a5e5845e8c4a171fdea04ed34
-
Filesize
72KB
MD516a2f168ec0886c2141740df3b1cc466
SHA1a57e24b15ce917012cc9bc17123a54ced4fa7de0
SHA25607d3e5e330255f46d783ce64d70bedf4230e1590909370aac2f6f12a47abbea5
SHA512dbf2f41dc861c08cc56bc2fe18614b691b01fba2bb58d4031dbf5ab904dfb1e7b9de1c2af00b7a990ecb220389980afcd01ac0f9cd6016d97afaa602b0cb027a
-
Filesize
72KB
MD57bdf216049d8e2e7b11b10c7d6b63d8d
SHA1a34bc78786e7add1505a16c64ad8878f31aacf60
SHA2567bdb304dcd3546b6a41b2ba355b4ca91d4e1bd8dc81fd854866dd6634ee26b79
SHA512faddbbf4ee188e60dd8a13292e12ad67c0e33f58eed3d0605a72df6417b1c3eb54bb6ae32822c92e87dcd50c724b560bac1980606513f65c6e8f3be8beae5cfe