Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 20:13
Behavioral task
behavioral1
Sample
cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe
Resource
win7-20240903-en
General
-
Target
cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe
-
Size
65KB
-
MD5
eae6ab953b46554b3130226434d53775
-
SHA1
22d6eb2bdcd26d7e8004e7c93a2b4c0885781ea8
-
SHA256
cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e
-
SHA512
75326d09d675b64df335a9156745057f23f60de09b4e238976df4a51a1dd3c0805254b86df87334b4594be6c9345fc89350baa28c5be8a68fd386ba702d40ce5
-
SSDEEP
1536:Td9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzd:TdseIO+EZEyFjEOFqTiQmRHzd
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2312 omsecor.exe 2712 omsecor.exe 4288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2312 4832 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 85 PID 4832 wrote to memory of 2312 4832 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 85 PID 4832 wrote to memory of 2312 4832 cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe 85 PID 2312 wrote to memory of 2712 2312 omsecor.exe 102 PID 2312 wrote to memory of 2712 2312 omsecor.exe 102 PID 2312 wrote to memory of 2712 2312 omsecor.exe 102 PID 2712 wrote to memory of 4288 2712 omsecor.exe 103 PID 2712 wrote to memory of 4288 2712 omsecor.exe 103 PID 2712 wrote to memory of 4288 2712 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe"C:\Users\Admin\AppData\Local\Temp\cb967123cc9a6ccc0769a5da043d9edad039af92711b6703f59c303edfa89a5e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4288
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5791b03ae8d54c18292623711b4899574
SHA17c72db257fcd5928c2c55cc295bffbf88de4140d
SHA256611359eebfaeb545cbebe1a2d612a3a0f6abba963adb70809fc57b3a6ae8e6e9
SHA512d79351c426aeb71c00ef10b9d1a8c662cf30872acda47745e4c74eef667b4c68c8756985feeb6bc8db5f0539570463577610afbdd6ef5b91b25424437ca830f8
-
Filesize
65KB
MD5edb6673f4e53d952efa7e2ba909462ce
SHA1e6c00f469fc9b3fe5c7fd7de7aba42b86b37714d
SHA2564426d01202bf8770b80f0f0ebda27b362a676ba6c1f94389218f6aa088363bf0
SHA5123b3837d43605b2979cd7596ed9202a17795311e4afe99988fb504b0aae15ac5ced7cb931f14ac9892b6dedff9febd53752cffc2bbb95332d18a7415278731bc8
-
Filesize
65KB
MD59b4094d0d820901b27fe115d10184c63
SHA1f9f7e690fd86b7a9ec10af6b95222ed49fc0efef
SHA2564d0305f63c2acb5a58de13710ae7a974cacca3bda5998980ddcbb37298cac9e5
SHA5120c3f46a2df79ce3925bd1d3b6553f1990ad6365c2c13c107c49aa1cd80e4fd99efa0588491b8984c19f80e37128eb16cac9bc32c76d2b66d3cc7243914315cb3