Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 11:04
Behavioral task
behavioral1
Sample
0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe
Resource
win7-20241010-en
General
-
Target
0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe
-
Size
80KB
-
MD5
b72d6e0501d41a0fcd53784f63d87880
-
SHA1
c371552655ece43bc7037d615057ff2cf57afafc
-
SHA256
0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a
-
SHA512
191374c4e0a25fd8c96919cf495d76d94788b44dbf08fdb6271ff086279c7d5615bcaba1ce02f060c0fe8078593824f5d13749f938b0bad0f1495ab4fb82f9df
-
SSDEEP
1536:+d9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9Xwzb:mdseIOMEZEyFjEOFqTiQmOl/5xPvw/
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1700 omsecor.exe 1076 omsecor.exe 1068 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1700 4988 0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe 83 PID 4988 wrote to memory of 1700 4988 0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe 83 PID 4988 wrote to memory of 1700 4988 0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe 83 PID 1700 wrote to memory of 1076 1700 omsecor.exe 99 PID 1700 wrote to memory of 1076 1700 omsecor.exe 99 PID 1700 wrote to memory of 1076 1700 omsecor.exe 99 PID 1076 wrote to memory of 1068 1076 omsecor.exe 100 PID 1076 wrote to memory of 1068 1076 omsecor.exe 100 PID 1076 wrote to memory of 1068 1076 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe"C:\Users\Admin\AppData\Local\Temp\0e7f0efe3dd76343ceab51a84f60013b3b2dc3e65d1737e913d59b597f3acb2a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD54b039ee756b17e056e240fb6394e1a44
SHA1c969ac901f61914286a7d0ab2c1617dd548dd9b6
SHA256ddbcc80660e2c21ae1b8281ffa77198b032389fa9f45f9a0eb71509185d99694
SHA512939b2b9a8a7c5cf7a645ef3a613f10cae601845b060ab24ff776b52d78805353ae616b0131f57c1aacf092e8d133e650dbfabee6a57e69ae4fefe35a41e83d01
-
Filesize
80KB
MD51105a5530d3484899bac92604df40e4d
SHA1ef081bef6e013dddd41ecb27ef59d9b41b249360
SHA256fdde056d55fc0b08db4c54aa08224516e7832eb3f0fd16aadcf5b2fc179e3353
SHA512ef86677ce4635679636b325cf37f9765c8ac529071e1eddfc061371be2169245fb6e25d7ccfeab3147f8e50423a4d544553244b71516ddd42dbe892255e4f091
-
Filesize
80KB
MD5c80f7cdc74ae496c7cddefcb1a65ff28
SHA1d9d44b7f3f0a5534a7d7109c1521a1621b02e6dd
SHA25662aff667855603485f5fc4d6d0784291313740a2daf995e5154aea4b90f8f985
SHA51276e03948c5704a063215f8dc6d13d0d775b6a4e15ba680e8dcfe238795a83b9bb522a4ca1564bb2ad577cef7534f45ace5005728bc616c244e8f126d2b80494a