Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-01-2025 15:20
Behavioral task
behavioral1
Sample
ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe
Resource
win7-20240903-en
General
-
Target
ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe
-
Size
80KB
-
MD5
da076b2ed075a780af25e7c8c523a56c
-
SHA1
9f109ea722d2a1c9ba0593bf40a1557ef1fa33d4
-
SHA256
ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a
-
SHA512
134821e7cd856403a6ee3b4224093baec2d6c8f0de9cc1189a51d6b9c2efa578e2d1485cd1b54ef2ed89c04aaf192d07c33a93411520c79445caff5aced263fd
-
SSDEEP
768:/fMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:/fbIvYvZEyFKF6N4yS+AQmZTl/5S
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3396 omsecor.exe 920 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3396 1596 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 82 PID 1596 wrote to memory of 3396 1596 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 82 PID 1596 wrote to memory of 3396 1596 ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe 82 PID 3396 wrote to memory of 920 3396 omsecor.exe 92 PID 3396 wrote to memory of 920 3396 omsecor.exe 92 PID 3396 wrote to memory of 920 3396 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe"C:\Users\Admin\AppData\Local\Temp\ef230aeb533543aaf7ed3bdd383958e36e936151f4d955593c6458b1044d203a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD54930377a5451987222094d54c8bf4048
SHA1364a3f18bdd62c1fb6ba18787c6255755fa2c8e4
SHA256ea728b35c2db687b50470ab9b908f6f98c1b356752f9174e4a20aa6dd92b6ce4
SHA5123ac22ac826fb09d85af3e4bd7b661f57eee5d22a85d77da2784ca05049c382a580b34d0f71cdae8e851b2fe2ad3b24a9944c4659037ee74d3ce07fc68dcf4496
-
Filesize
80KB
MD58bd178539e623f608067212c277da57e
SHA1836d6b6bbcd2ab42b57c7be1c7b8f3b16a1694fa
SHA256abe710c256e8bb267ebd972957a76dfa4181afffb616baa7cc43b8bfbe2d3086
SHA512a75ef28b019b4ca2a06bc72f3782a294c91373c3c2fe1d604b9139d356908c433a0e186d3ab791ce1e2245b6fb6b2c57aaa953650632db70cd27df73dd78d3ca