Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 18:54
Behavioral task
behavioral1
Sample
05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe
Resource
win7-20240708-en
General
-
Target
05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe
-
Size
76KB
-
MD5
af73dc59f5c9746496cff37edba69c50
-
SHA1
6c90b661ad79930d25d153ed308223b31dfa6fb9
-
SHA256
05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688
-
SHA512
1ad188fd0165128c3eef7d694fce0b7654674169e8dba9f38103dc8114f0a422e475960179410145d3656cb70103a815c07a3c6e23c313689034f1b8246747de
-
SSDEEP
768:VMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAWZ:VbIvYvZEyFKF6N4yS+AQmZTl/5OZ
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4488 omsecor.exe 1344 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4488 4240 05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe 83 PID 4240 wrote to memory of 4488 4240 05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe 83 PID 4240 wrote to memory of 4488 4240 05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe 83 PID 4488 wrote to memory of 1344 4488 omsecor.exe 100 PID 4488 wrote to memory of 1344 4488 omsecor.exe 100 PID 4488 wrote to memory of 1344 4488 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe"C:\Users\Admin\AppData\Local\Temp\05e4eeb2e8b90ccc60db4edbd046fefdfd562626b2d8fd9d5d2fb4c7fc32a688N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1344
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD556bd7d44e2046c42069c7700a19d1e49
SHA12f18be4ffd918125d0b6d4963b99134971db06a1
SHA256632ae4ba7960c1226772d3e40370ae46e0a0d242640c3cf88c6c049d6b0a5bbe
SHA512b782dcaebb3a8de0a841ef8df406b54f60eb4acc0f25d816d44825be5ff52ce97e466468e0815e4383de899d122667d4028fd67a33d66a6f8e989781284e5193
-
Filesize
76KB
MD53e29b82d69e6d96137cb4294a1c7768c
SHA1ce1984153a647eff2bcc8072bcfdfc2400ece3bb
SHA2568b1e103dedb5673de16c5ffd240db18f8c7287fe046674b36c1a3bcbd97ff86b
SHA5122bc266df5759c2f79ff54241dbd6b44e9f799156e22b12aba7b511e41550dd72a9614ee46e25db4c65fe73ac684f45a4b14b7fcd0f0019e6b53dff97402f259f