Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:08
Behavioral task
behavioral1
Sample
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe
Resource
win7-20240903-en
General
-
Target
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe
-
Size
61KB
-
MD5
5cece95a926ddd025e3a97cf5a13f044
-
SHA1
0dec504f3b3526292722672d8105e1a90e7cb246
-
SHA256
adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1
-
SHA512
fbe55158701e977c27f2c65c839554399b8413ffaa61b12df70cfae4aa6643025db412ca7b5bcae2e28c7b4e091bcfbdfdebc80459070b44ed8692fec947055f
-
SSDEEP
1536:hd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ1l/5:RdseIOMEZEyFjEOFqTiQmXl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2484 omsecor.exe 5072 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3412 wrote to memory of 2484 3412 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 85 PID 3412 wrote to memory of 2484 3412 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 85 PID 3412 wrote to memory of 2484 3412 adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe 85 PID 2484 wrote to memory of 5072 2484 omsecor.exe 102 PID 2484 wrote to memory of 5072 2484 omsecor.exe 102 PID 2484 wrote to memory of 5072 2484 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe"C:\Users\Admin\AppData\Local\Temp\adf89b423ff93c7c6d744feccf8c23313e7a6af8e456458e4f38a0b37befeed1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD576a3cb5b776b0ca47bdf4209507bb557
SHA1c342a00daa71aa1e22782bea375747092b221f47
SHA2567e605a2b4b368d47b085546d08385f561a6cb12f722ff325f20455972c6b7a9a
SHA512d01e48a137b01ffe087ba63a7acfdd0dd14ca114ddbe60189d4bf9623cb48847474247ae426145ce2002397f598f5c35650d8ba6087b8a0cdb3c2e46222eecb2
-
Filesize
61KB
MD51f57e120aa3f7a40f4edd5a72b78fd37
SHA19442358d6dabf7605542a856c80989447a585f60
SHA25616ed38e09f6c0a839acef6685ddba84fd51aa816bf683a6fa8e7e25660123132
SHA512e79d29a4167ba01ff9f979b7caf76afa5ced79e865a31821517ba3129517d8f5c6ace035fc57098b4f2132fa50cac01c073ace14b7a19e97f567b9976c79f301