Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 11:47
Behavioral task
behavioral1
Sample
b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe
Resource
win7-20241023-en
General
-
Target
b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe
-
Size
80KB
-
MD5
ea52200dbd683bc5981df0295e11fa90
-
SHA1
61dfbd5f353534c5c7ad3b2824c1a12ce9098f9e
-
SHA256
b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483
-
SHA512
255555ae32d54ea6da40d6b53733984e7b1af65d1b20ce7dfd05746fbaa459ba57da43257f481e9c8727e3fc4094b4c641614a396e87a568ceb2d8ba7bebc4ef
-
SSDEEP
768:ifMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAO:ifbIvYvZEyFKF6N4yS+AQmZTl/5m
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3820 omsecor.exe 2296 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4460 wrote to memory of 3820 4460 b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe 82 PID 4460 wrote to memory of 3820 4460 b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe 82 PID 4460 wrote to memory of 3820 4460 b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe 82 PID 3820 wrote to memory of 2296 3820 omsecor.exe 92 PID 3820 wrote to memory of 2296 3820 omsecor.exe 92 PID 3820 wrote to memory of 2296 3820 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe"C:\Users\Admin\AppData\Local\Temp\b067f350fcff00b18ccc9f6779e8ec49c2db062ac8cab36666f527fe2f3c8483N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD599920d798b3f640af318d2f6134735b4
SHA151fab2f5b2660d3f116b49c05929556b297a1b00
SHA2566a22b6b28b20a7c2175442f3399328e29dd7d2365ceac30d602b3c3b13a1ef8e
SHA5126c9595c351ced2ea9d5066ac8f92afc14dac77b1d2b9ac2d229bbcea306621480511ee192d771be8ba797299823f000e1f664d58611e835735d309446be23527
-
Filesize
80KB
MD553c479dffbf0a66cb330b9092259fe2b
SHA15c5231e8c9c4c0a7652b08ca20c679cbf9465c83
SHA2565cabda04807c9b12cb450a62b4f5c7378571790ed45bddabf652c992135a0379
SHA5125157eaca2caf46b94d065ca045c05f34fa193d2db3860b9abacbea222339bbd50f877288c28b682f8d543be8e1d81f9a97de509f2941ec177ccd4b9ccd5a3617