Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 13:07
Behavioral task
behavioral1
Sample
df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe
Resource
win7-20240903-en
General
-
Target
df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe
-
Size
72KB
-
MD5
ab4f61fef0ff7358cbfffaf022324ce5
-
SHA1
300c6c788cc3bc1a9eaf268679a37033dba7771a
-
SHA256
df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df
-
SHA512
79ac1e5bbfc8eb7ea87984934af4beca0cd1c03794802aecd621c83633780b6ed118c8c434667c736cf5d82b8615cace4de636ee7b72dfff6fe5d7fbee8d59c0
-
SSDEEP
1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211N:bdseIOMEZEyFjEOFqTiQm5l/5211N
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1444 omsecor.exe 516 omsecor.exe 4432 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1444 1948 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 82 PID 1948 wrote to memory of 1444 1948 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 82 PID 1948 wrote to memory of 1444 1948 df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe 82 PID 1444 wrote to memory of 516 1444 omsecor.exe 92 PID 1444 wrote to memory of 516 1444 omsecor.exe 92 PID 1444 wrote to memory of 516 1444 omsecor.exe 92 PID 516 wrote to memory of 4432 516 omsecor.exe 93 PID 516 wrote to memory of 4432 516 omsecor.exe 93 PID 516 wrote to memory of 4432 516 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe"C:\Users\Admin\AppData\Local\Temp\df940589174e2c68d77c6aaccbace9ac36ebaa25280f3536d1e1b24ca49a94df.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4432
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5922c97135085736bde90d8fc1bc2c61b
SHA10340aa4c0f36b0da8f87d6745eef0c3deacbb4b0
SHA2567f694cdfe51ce73075d0464c910d627091b2c65370aa76ba9076b0c52b1495e8
SHA51236e3c9c08d64a5a736baa45151c085049f163364a3cfd3b27b5d04a41a90b1e303140ac338428fddf200439455edb8aefaedf9e7403c662d0af42894a241ab6b
-
Filesize
72KB
MD551719922ea0a2797859e18285458f816
SHA123ad62e8d96b47b133e2982f2814b9ee44afca36
SHA256ed98b469a145894e00d39ec14bc7a182c14cb31aa38fec217690c300c79acbe7
SHA5129d88e5faaa8bbf9898b262d5eaf48f39cabffc73d258390a4688862662e237d4d4887a68fb0035b846c9592fe3989a60de9dc4e305b640ceebb772b44a16c887
-
Filesize
72KB
MD5d698a3d0696e1c44c55ea04016b6699e
SHA147cbca6754283091781b6377df8c98f10de9b86c
SHA256783ad2cbc914067c44341ec841bf820fd2d0210a1e624775147d299004ee9e15
SHA5123d651bc19c714d15216c711cd0d9dfdd9519f3101160cdc55631e632428273aa0f41b1713702a3cf97ff3161fe206610283911818b0fa4267db2603e9d2745f7