Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 08:37
Behavioral task
behavioral1
Sample
c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe
Resource
win7-20240903-en
General
-
Target
c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe
-
Size
80KB
-
MD5
6b1d0da3d634c4d601247ec73c3a1046
-
SHA1
592151cc1d7029baf7a15ec4545e893142176130
-
SHA256
c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590
-
SHA512
915ab92bd344117e9eb74b8ec78cce6ec7c9a05e0341d8acedf12eb2bcd75865c3fa5aa4a27355845d5afd3a5dea298ce4e24732ef0ec673f5047328a440e695
-
SSDEEP
1536:ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzh:NdseIOMEZEyFjEOFqTiQmOl/5xPvwt
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3156 omsecor.exe 4748 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3156 5036 c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe 83 PID 5036 wrote to memory of 3156 5036 c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe 83 PID 5036 wrote to memory of 3156 5036 c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe 83 PID 3156 wrote to memory of 4748 3156 omsecor.exe 101 PID 3156 wrote to memory of 4748 3156 omsecor.exe 101 PID 3156 wrote to memory of 4748 3156 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe"C:\Users\Admin\AppData\Local\Temp\c35fdcce61d0b56b993c3e8bb495ea0c8f51f43ab39f30bfd7f629eaf3a2d590.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD52a08d7ecbb2a8d696a895307850a24c4
SHA1f337721b2f100203a098539c01379d00cc8d5714
SHA2567175449f16e839030a1343ccfa8d9704151228a7558b83dc2d8df8b2a31a1d40
SHA5123b4901b0a61a9cf2ea2c71f3f35b977f5b27a9970a351487f1e4c09d175693f0c97b1499adaed10e1e999de19fbdd99f3f5defea7e7fbcd55f7cf9d687d6f898
-
Filesize
80KB
MD557d69ddf8aa9ccd05ecb3bf06df8d951
SHA1708a875b5352d0ddfbecdf389d3783f0860d63d5
SHA2565bce15680d431792c394808c7df13b44b1d55ba81e0180efc88bc5ab6d52a7da
SHA51239c8aabfe38d44151a60c99171f0779ad163b7dc39bb52a1df1e91ea5b469b2854d030cced3cee3953c57a2542a340904548f519989bf33ed541e5d05dc82afb