Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 13:20
Static task
static1
Behavioral task
behavioral1
Sample
fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe
Resource
win7-20241010-en
General
-
Target
fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe
-
Size
33KB
-
MD5
d3f0cf406da9136839b1e44fe2f893d4
-
SHA1
50e893170eb84751f4dd73c0999a070ca9b76119
-
SHA256
fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b
-
SHA512
66aa4b677c1c928f48ddb67238b73ceb65231c023c515b8ce8c7b0d4cd8b0e71b66bdb12e074f9ed0f3a4cbf2762c91e71fca7b5c32d82555d11cb8907faae8a
-
SSDEEP
768:LfVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7Dj:LfVRztyHo8QNHTk0qE5fslvN/956qg
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4580 omsecor.exe 4568 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1852 wrote to memory of 4580 1852 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 82 PID 1852 wrote to memory of 4580 1852 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 82 PID 1852 wrote to memory of 4580 1852 fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe 82 PID 4580 wrote to memory of 4568 4580 omsecor.exe 92 PID 4580 wrote to memory of 4568 4580 omsecor.exe 92 PID 4580 wrote to memory of 4568 4580 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe"C:\Users\Admin\AppData\Local\Temp\fad67cfd3a08bfb989ad9c02d48cd8f1c9399a8eb0da45bec336bc4312d5d30b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5bda0144dd27c24e62b4b297335b54457
SHA1271a84cb22521148c4885f3363cfe83d74e9cd53
SHA256c46ae14328aa619df6c3e20b4cc284af6187e314ffca154eb51d78316cc862c9
SHA5125e704e914656a5d5ec7f3dfeaa7d5a8a1e5603372aa83574ae759585a8315d67228a8cb054bb45c22bde76b6edd6fdb134eb2eb4245dfc5432b989b450cf40fa
-
Filesize
33KB
MD5aa991d07689a14a8f6838b09870f98df
SHA19e2e9e5c511d627310d980f636c18a27c7619228
SHA25613f74f481223d3d9bac06b2279220de85f5e4208dbb8ae46e5c68ef984c7fc53
SHA512a7d0b55c8dea9a482f5c03632bd723adf21dc3d85b6b9c81627a53569748c9a83033afeab1967c85913dd7ad7ca8ad1c199fd194502c35a6eaecad5dbb47374c