Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 03:16
Behavioral task
behavioral1
Sample
558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe
Resource
win7-20241010-en
General
-
Target
558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe
-
Size
71KB
-
MD5
7ce19ee46b20bc7fa97de6575b57fcd0
-
SHA1
b81fcd0ba1fc81b2217a225b941af81ec84511a2
-
SHA256
558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bb
-
SHA512
1fa6cb702e727ead10bab315b3e91826615c713588a74b06c55ec730410a2c3d61b42688e4e6caf9e5d261f1155616a30061c3ac262c35a0f5174129240b6f2d
-
SSDEEP
1536:Hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbH:vdseIOMEZEyFjEOFqTiQmQDHIbH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 1984 omsecor.exe 1868 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1044 wrote to memory of 1984 1044 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 82 PID 1044 wrote to memory of 1984 1044 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 82 PID 1044 wrote to memory of 1984 1044 558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe 82 PID 1984 wrote to memory of 1868 1984 omsecor.exe 92 PID 1984 wrote to memory of 1868 1984 omsecor.exe 92 PID 1984 wrote to memory of 1868 1984 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe"C:\Users\Admin\AppData\Local\Temp\558419ef8396a3bfc738bb89cda879758893c2835a8f586f0a01a6aefc2836bbN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD555af92e1c5f4c5d4503c63132351915d
SHA1bd045d93d6164a8d6d4ede31043734175c985c40
SHA2561bea8350bf221dfa97dd4f7574d403eef891d0cd0e0422c48763fb09807b40ef
SHA5121116409b5694f5312297a50b6671539bfe0c59eafe4a4654ee021273a5a501e555805636219d281829d39dae458acd588f021c1683815a8f9eca64f088933575
-
Filesize
71KB
MD5e8d7ec3e01a9c8ae6429c45212e5766c
SHA113da26e3750b2921f4255f14fdc584016489e093
SHA256f6485669a7e7cd2e333ec6f7be5994893307541f48509e9e52c3bfb8ae1d99d2
SHA512dd39818442c37b47221236a6c25992135c072cf0045ee08fbc17e76eb8c8ad84d6dce535dd8b19a7b8d149a87ee708aaf13e9e4ae53c07772aaef67c528e5b93