Analysis
-
max time kernel
114s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 13:38
Behavioral task
behavioral1
Sample
e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe
Resource
win7-20240903-en
General
-
Target
e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe
-
Size
80KB
-
MD5
6ed735df8a85a7804ab3b68feb080ea0
-
SHA1
554b7583869485fb2194f1cb465bb9421906455b
-
SHA256
e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644
-
SHA512
47ae9f7057b41dcc8fd51ada7fa71ee381a76f57ec02cc1bc039de3529a670b63d6c47df8d4d86a22c1bcb5af70874a02fdd8f4b27930ef5f875e7d3e183e673
-
SSDEEP
1536:Ad9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:gdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1348 omsecor.exe 1000 omsecor.exe 3556 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1348 1608 e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe 82 PID 1608 wrote to memory of 1348 1608 e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe 82 PID 1608 wrote to memory of 1348 1608 e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe 82 PID 1348 wrote to memory of 1000 1348 omsecor.exe 92 PID 1348 wrote to memory of 1000 1348 omsecor.exe 92 PID 1348 wrote to memory of 1000 1348 omsecor.exe 92 PID 1000 wrote to memory of 3556 1000 omsecor.exe 93 PID 1000 wrote to memory of 3556 1000 omsecor.exe 93 PID 1000 wrote to memory of 3556 1000 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe"C:\Users\Admin\AppData\Local\Temp\e77c84b546484e803ac88dcbe319440fdff6c94c721d082761e9a357efdc6644N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD564d761cf1fa6c85aef59e5d52cbbed94
SHA15ec44a765ad1fa5c1dbbe52f76184b494aebb12c
SHA25672d45a9b3506f6b8446455c6359d9c2eb3942ad86ceba5d941d9401e95874162
SHA5120ce135a65a95768950f29dd7c8d57c38795f276a709b013eb9b9441b099cd2ee46958b48c1db83fac863b61f5c57dbcbbea70b7b5c64fcece3775a6769f05325
-
Filesize
80KB
MD59cf1fe789a63984248ecda8302d6fedc
SHA177fd36a0f93197ba5fb7d0b50d273f35489fc556
SHA2568e4314f4e5d6839ee6985a1e54cfd250afbb784551d9bb00a01795260c2d2b72
SHA512e51ccdc84853d207ea4fe15ce914b5c45a1a1c3ba23774f41a65180410becd02722ebe9454735aaa62b9166b7aa573b9e776651f71daa13456d14b2909244bc4
-
Filesize
80KB
MD5e90d18a7664af776047ccea94a04bd47
SHA1537cf8861e5e33c809c43327d7eeff023a09ba12
SHA2566fc6b2893098e27db4d0529d223c1e62049c3831a824227eea4ad62d0be8b195
SHA512dda5c517ca33fd615c4675f65cded0b2216ec24760284f6f303cb91e08e2553d6c4615fdadc2ee3882f6db54cfb94679bff765e3566c2cc8219f0f17e9c349e1