Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 10:28
Behavioral task
behavioral1
Sample
c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe
Resource
win7-20241010-en
General
-
Target
c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe
-
Size
88KB
-
MD5
e9fc44453f841d897b6e41a344acca00
-
SHA1
5f54d50d83e0ec1c847b6579e9b787855d1dd34a
-
SHA256
c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78
-
SHA512
62551e67749b6f143613fad524111adcb22bed70648b662438bc139563c085403f8003aa1e2d52e00ef41a78ad2d8ab1dd3433bd80594412dd910cc97f2853d3
-
SSDEEP
1536:nd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5h:PdseIOMEZEyFjEOFqTiQm5l/5h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4560 omsecor.exe 2136 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4560 1224 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 83 PID 1224 wrote to memory of 4560 1224 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 83 PID 1224 wrote to memory of 4560 1224 c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe 83 PID 4560 wrote to memory of 2136 4560 omsecor.exe 100 PID 4560 wrote to memory of 2136 4560 omsecor.exe 100 PID 4560 wrote to memory of 2136 4560 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe"C:\Users\Admin\AppData\Local\Temp\c90976a89b262ddd5440700747bb1e1830ff8c1d03a9d2b2dc55153b1b482a78N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5b504d8ca067b5099f733450555fafc83
SHA10a2146d692058d0d80360ac2dd87a1697d7a46b5
SHA25601385a1712218d6d9bf66ac3988999712c94997cd6d04e0fdb64127139bb490d
SHA512d242523a100d9e02118a7219fbd1a9b19134afe46c99d2d2c821605fa96ecdec1d5140050fffc206cd2e20cff2b6542a976a4b5325e63d2c292b2c972fbc702a
-
Filesize
88KB
MD5ca1397cd4b95e5d26a6f293c1d237e99
SHA108a13d13ab0752e14e41b0db7c679e8c3209d7e4
SHA25656d1348e7d687929cc68660fcb2d3b87b87e2e99b1f6dfce422b8e5ca57533a8
SHA5123f0a02b6791d2ba696c6c9753a69b9bcd12068170b911604bc67a31ad0898786b6cc3ea5d4302a9ee8f68628a2df25bf8cba9982b40172b6e3cd2be0e368a38b