Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 08:23
Behavioral task
behavioral1
Sample
a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe
Resource
win7-20240903-en
General
-
Target
a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe
-
Size
72KB
-
MD5
62be19596e8019d7a7a20441971b5051
-
SHA1
1cd40999f303ccf257f961356310a9094800c9f8
-
SHA256
a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7
-
SHA512
20d3a13bf518d35789473f5185b44feb280af3116b8f82cee05674df8a1ac5715d9c7ee2b40f8271196d81a112dd32d8e570fa40b3c9e95c3e1c11c9cd44405b
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211N:7dseIOMEZEyFjEOFqTiQm5l/5211N
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2304 omsecor.exe 4524 omsecor.exe 3232 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2304 2676 a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe 83 PID 2676 wrote to memory of 2304 2676 a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe 83 PID 2676 wrote to memory of 2304 2676 a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe 83 PID 2304 wrote to memory of 4524 2304 omsecor.exe 101 PID 2304 wrote to memory of 4524 2304 omsecor.exe 101 PID 2304 wrote to memory of 4524 2304 omsecor.exe 101 PID 4524 wrote to memory of 3232 4524 omsecor.exe 102 PID 4524 wrote to memory of 3232 4524 omsecor.exe 102 PID 4524 wrote to memory of 3232 4524 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe"C:\Users\Admin\AppData\Local\Temp\a81b05651fb9add88cfc756f95895a2878a172439267b21db279aaf840b9d5c7.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3232
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5d4f7f8a25a3b682189c06fbb01ec93f6
SHA1cc82e992ee9fa9456095fbb6477604ab000dc4aa
SHA25608778a8ce4698e30b1f39509863cd4da8d786f3e33cb5f5a50c0521344e55c3c
SHA5120fa289147bea06ad28566c6999703e49fa4ab0e9cc96e1751d5214e716cbf98e7792bfe125e9ff7745c15e141cf63a7f17aeedcc6adf9328e2761e9b777b18eb
-
Filesize
72KB
MD5aeea7c7245792599f748893709bdab47
SHA12c3ea2f557a2b7d1d8ae0a879ce618c4457ec0a7
SHA256682b4e99ce94a8c75d405d60e0167cb07a2f3b66e32a2a73c5f54a706fe72f65
SHA5129bc195ba12e7791800bc4079e14fdb22ec4e4ce7d80cfd9df0e1685e0d346ef08db59e431e846f3b7d4c546132bc2ddfe09269818b9af2822bd2335332ac8d66
-
Filesize
72KB
MD56b4ff6cf62507c2a2f2ffde82a12c462
SHA1cba3611e4e94d463f022d682ef90257d895af032
SHA2568522e578699a97e89d027bc0fcb646ccec0039d5983c4ae2886e1578b5228fe5
SHA51224511f00c36f8e3b114ed9d33940a4c5dc028741efdba06665feb8a05eb560c36086221282e0ea510552f4ee03d26ca348070c224b9860b4ddd403f0a058b0ca