Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 21:21
Behavioral task
behavioral1
Sample
1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe
Resource
win7-20240903-en
General
-
Target
1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe
-
Size
71KB
-
MD5
59a8c47d53f2ac3614624307d509b36c
-
SHA1
a832daf4677363d58130efedade6ae57ea54f042
-
SHA256
1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266
-
SHA512
80d9d7a03444bd38187a26b84280306b5e33d71792d8aa4b3e1a3c9a9e36dc5879fed294eb09359d18fe073c3f947eaeb9bb9ddeffc128ce7854f1c3ea572c46
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHX:7dseIOMEZEyFjEOFqTiQmQDHIbHX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2896 omsecor.exe 3288 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3512 wrote to memory of 2896 3512 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 83 PID 3512 wrote to memory of 2896 3512 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 83 PID 3512 wrote to memory of 2896 3512 1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe 83 PID 2896 wrote to memory of 3288 2896 omsecor.exe 101 PID 2896 wrote to memory of 3288 2896 omsecor.exe 101 PID 2896 wrote to memory of 3288 2896 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe"C:\Users\Admin\AppData\Local\Temp\1c0cc28b0b839ac95595a0950d20fd4c4a03c1104b314d03929578623d08e266.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3288
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5a3275f16a6a42e080f686c1877e8b568
SHA18b30b39b0274d42d178efc5ac5276ba632e0822e
SHA25618a148eb2bbe44f0244a9f7bc244c258aa996e5d2afeac0c098c8fe58b45d52f
SHA512104ad482cca5ea483ec90f2e0f8982fe9f41f76c89e7c692144efab1e5753865cf93aeace0f358ff0a1f7f420a10e594cf7e09228e0143570004c6b2d5948648
-
Filesize
71KB
MD5e66fc731ec27cb9616f9d6dd3958b236
SHA12e62579090454de107347b740364cb2dc3d7d162
SHA256e88bf8c10593028f4cf219a1c19c03299e4ceded10aecdee2962b35b831f4893
SHA51291b50a849aa0e99896e0ac148a99476ddc2886959f9fd29011fb01ea5742700460d278399505c64b3a0604b8663c0ef558646bd4ed9ea7bf327753d048a516e1