Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 09:18
Behavioral task
behavioral1
Sample
6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe
Resource
win7-20241010-en
General
-
Target
6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe
-
Size
65KB
-
MD5
967d66a4fe4c892c456e5b311c9f8030
-
SHA1
737f06df05b84c744cac6f17ad38ed01a8e543ce
-
SHA256
6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70
-
SHA512
57cbc624688ac0abbfa21e9c6ec5979d5e177929a9d22f7c20bea7be9771b9a119f4c608ada98646ab6bcdd9e2c506b76562503c80aaaa6c7b878ae9ab56397c
-
SSDEEP
1536:Td9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hz:TdseIO+EZEyFjEOFqTiQmRHz
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 3504 omsecor.exe 4020 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2892 wrote to memory of 3504 2892 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 83 PID 2892 wrote to memory of 3504 2892 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 83 PID 2892 wrote to memory of 3504 2892 6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe 83 PID 3504 wrote to memory of 4020 3504 omsecor.exe 101 PID 3504 wrote to memory of 4020 3504 omsecor.exe 101 PID 3504 wrote to memory of 4020 3504 omsecor.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe"C:\Users\Admin\AppData\Local\Temp\6bdb76e1a57330a4fb810513ac91a197e6d66763c11cc979788dda75a4212a70N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5c8ba6fc976a1a514a86b6fbb5b03b99d
SHA1a104400b57774c198272557bec9f16ccf66dcf08
SHA256116cf1c3a38fc0c1eea4316b4c80eb6822827ed17605bc741ed6392dce224771
SHA512f02457dbe9c7862448e6fd52be13c27e13236100d1fb8dc760f14b9b4eaa1dcaad18199791c803aa1a8f5ab9d674ac51a7d77b9028c35dbaef999804192c7267
-
Filesize
65KB
MD59c1b762a5c6cbc4e937568d6a3d20f79
SHA1881f2197399afeae045c8ce6406336953823b327
SHA256e08a3ee681429a79a0b87c73fe0a30493a2132f38694d91a5d58157d402fea31
SHA5128f750404e5f182792fcf990a2b297cfeb027b3ab189e83ee8cadfb4f0a649997c2265ae0425f64b3453a269520d034b0b196a1f45abb33f4852384d25c4b3398