Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe
Resource
win7-20240903-en
General
-
Target
1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe
-
Size
33KB
-
MD5
5a47d70d6c14de2812b274ea2865fd7c
-
SHA1
9e076ff7cd9e0219be632609a6883fdd2e1cecfb
-
SHA256
1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5
-
SHA512
9dd912c1a3ab0816a1bb04667e5d069966c91b75a47373fb529c73e6b53d645768d80ac42e631fbb9e8139c9cdee50c278a6fb9ad01c8355285c30d922c0e101
-
SSDEEP
768:8fVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D9:8fVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 5060 omsecor.exe 2672 omsecor.exe 3416 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4896 wrote to memory of 5060 4896 1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe 85 PID 4896 wrote to memory of 5060 4896 1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe 85 PID 4896 wrote to memory of 5060 4896 1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe 85 PID 5060 wrote to memory of 2672 5060 omsecor.exe 101 PID 5060 wrote to memory of 2672 5060 omsecor.exe 101 PID 5060 wrote to memory of 2672 5060 omsecor.exe 101 PID 2672 wrote to memory of 3416 2672 omsecor.exe 102 PID 2672 wrote to memory of 3416 2672 omsecor.exe 102 PID 2672 wrote to memory of 3416 2672 omsecor.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe"C:\Users\Admin\AppData\Local\Temp\1bd6c3daa3adbeb30369aecb269271a8d89d4a393685c69424832a769fedc7b5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3416
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5eae00632409baec0d50ad932855f1233
SHA16ac1c3ec81414330508ce03fea0a100474cedcb2
SHA256a05b32f8dc05922b60c0bbeece0d089082602ed267ee29f76025b298ba950254
SHA512afa6e09a1c02439a91b261ec878f8ce01669fd4d8b4602bb48070770d9530bd79aa4430bfb1f454231d699827c9d35aa93344d6949cc495f9421670cbf44bb41
-
Filesize
33KB
MD5206aa60a14b2518de9c2238ee78886e1
SHA123f7ae38788c1e92577ddc4e8bf2973b55f49664
SHA2569004e7fddac3a250ce0be3886200eeeab9b9f65d557b4b025484f0c606dc9d50
SHA5127a28f8457e409e689769d64dcdf68bde24566b67b2916945a51e9126cfbaf7b9bd6248998487361c4cbe9807e2d8b0785ad36fe139a846084c2a6d6f4f731993
-
Filesize
33KB
MD583ac921d516b8bda10281ea2c8e416de
SHA15401fde76fac97e16fecbc2e4b5cc158fd15c832
SHA256fbff519002f48c2d1fade5a015a35fe3dbe7b8aadfba59677d2af481f1457b76
SHA51251ed70c7cf457cb4eb812cc976c891b0449804f8b0732aab624fbc148191605ec98001c9c88f31b242197263c71760e23b9d0e7a52ba5812b63ff9d7c45e8f6c