Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 09:28
Behavioral task
behavioral1
Sample
ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe
Resource
win7-20240903-en
General
-
Target
ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe
-
Size
61KB
-
MD5
5e1f7996331d7c63d518437ed335f68b
-
SHA1
d4da47d3e22d3c6cecd81244223222f1e8b30e64
-
SHA256
ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483
-
SHA512
50c1ffcd2ffdcdd68cdb76c33a674e67d61a90b6c90b480b83771e33b830f2207d0e8281ac3b5abcc49343a07e65cdfbc0216c10fcdc42a96139b35674100a3a
-
SSDEEP
1536:Pd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5:ndseIOMEZEyFjEOFqTiQmTl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2348 omsecor.exe 2024 omsecor.exe 4868 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4184 wrote to memory of 2348 4184 ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe 83 PID 4184 wrote to memory of 2348 4184 ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe 83 PID 4184 wrote to memory of 2348 4184 ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe 83 PID 2348 wrote to memory of 2024 2348 omsecor.exe 100 PID 2348 wrote to memory of 2024 2348 omsecor.exe 100 PID 2348 wrote to memory of 2024 2348 omsecor.exe 100 PID 2024 wrote to memory of 4868 2024 omsecor.exe 101 PID 2024 wrote to memory of 4868 2024 omsecor.exe 101 PID 2024 wrote to memory of 4868 2024 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe"C:\Users\Admin\AppData\Local\Temp\ea4768945a032acabd3b8db12e9d0c3ffe730ce946ed049f7c75222393223483.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5b60592ea831d8549f838d2c2121866f4
SHA1b2c8e5bf83f701faf871fa7e292ec79563c52095
SHA256d66a230a589100b8f7a5bf6bae3094bc6c1e1f12551e51d20336b71483bf8483
SHA512a0deca5b401a75d55a64513041426109f25b3bb682080a5ecad965febc5f85636c4df63bdfea1c707e0c33852aeda23b02e68d5b3c2d2843546290eb56db07ee
-
Filesize
61KB
MD58cb3c839555c9e36c818a4c58f0c5d12
SHA1d85e57ba93a861af56946952007d92936a6563f1
SHA25622b1bdec83b83f802d410988c6ff00cadb7af761dc3fd44432e28928f5a682a2
SHA512945df41c6e37725c600801612348d1e8bea6f05d82636f03e264aad3d3152ae836d3bf335eedc8371862f344f1a171c136e04c310da815cb321056635e3b1a2e
-
Filesize
61KB
MD560ecc3280e134182e82759e7fedb626d
SHA1f9a4608700ee0c4bbeb4475a3275ec80544f90a1
SHA2561b76383720b4d214e60d10423a2ffdc9b3e61c1c87d4c0f69a040110222d19fb
SHA51248ae1846fe2336ec290afe58a3b07a86ddada6376ee76ebd9133ac52950bee3bfabe17ac2325843c953b1b1aa63f59b07f6e51ea95e783f95fb603b59b0c5574