Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 14:44
Behavioral task
behavioral1
Sample
e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe
Resource
win7-20240729-en
General
-
Target
e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe
-
Size
72KB
-
MD5
8a86f6907e31ff1e142f7ad6150c7bb0
-
SHA1
acb56477351906d3cd1e19c34ca5dfa5af6edb16
-
SHA256
e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557
-
SHA512
70c90ef4a7b025473e4f9a31f6efa770b04679439bcf13a17dec1e3d7080e933ac7fdb11f9831300021f5a48d4db67bb89bff383b229cb2ba7a87d6f4ae363c5
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211t:7dseIOMEZEyFjEOFqTiQm5l/5211t
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 4928 omsecor.exe 1736 omsecor.exe 1920 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4928 4852 e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe 83 PID 4852 wrote to memory of 4928 4852 e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe 83 PID 4852 wrote to memory of 4928 4852 e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe 83 PID 4928 wrote to memory of 1736 4928 omsecor.exe 99 PID 4928 wrote to memory of 1736 4928 omsecor.exe 99 PID 4928 wrote to memory of 1736 4928 omsecor.exe 99 PID 1736 wrote to memory of 1920 1736 omsecor.exe 100 PID 1736 wrote to memory of 1920 1736 omsecor.exe 100 PID 1736 wrote to memory of 1920 1736 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe"C:\Users\Admin\AppData\Local\Temp\e8eaf2fb655d8059030acc99c5d283d97a8e2565404c4af6ded877135328a557N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5066137b8b6f2c29c01f7d68dea1c406c
SHA177f545273f872e74351f3a764f439beb5b45c533
SHA25667bf7be264641aeaede76e3858ea78ba86bfe48e61cf936ff37f544d86edb580
SHA512585597eb023f8de994662afff8dffcf1028c98062d4fe23b9092154a03c56af48bf1e9d6384fa70d511875e0861411de46b8805e2278ae89c9ba26b3e243cabd
-
Filesize
72KB
MD59198dbefcf9e5b77e4181c9ce5de145e
SHA198681b3812b3f32a70e199570ee0a43a8f5300e7
SHA2565326cedddaa319c4fd41b27827494006292a9187483c39b316787343ef8e7086
SHA5129ae2b2cd8a1f64441a0b354e216d4f8459706c003a2d628150ecddae2b4244248333041e42cfd72055dd397d36bfb55b4505f604d9bfaf74482348a52ac2b19c
-
Filesize
72KB
MD55c35fb0bd876d2ce72db8c0e06b1830d
SHA160d23132dd1a1714b46e2e761f89f85a14bfde1e
SHA256141773fd8530f9c2a3cb33e990b5d2af6549debbea9d52df50721b77a6ae6a92
SHA512e4c4b8d0758525d4bba1aa5d96bd895860bd2f699e45e2c5106583e61a961f806064084444eb78fd9ee6e7157575ee122f8b0c7a94e350e9dc7c784816e98588