Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 01:42
Behavioral task
behavioral1
Sample
aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe
Resource
win7-20240903-en
General
-
Target
aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe
-
Size
80KB
-
MD5
3ffb0284778f950150c4e19aeadaffe0
-
SHA1
43d55831703b9d8db52ef3776705e0cc5bb7cc35
-
SHA256
aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755
-
SHA512
2c7ea411a9712521bf38848d359d92bf5a86824e3ad0f6f1fa2b486075f5972447c468a4542c8a15a9bbd4fcf27c1e0ecda9edf505291e92e9dde00873d39224
-
SSDEEP
1536:wd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:wdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 2796 omsecor.exe 4492 omsecor.exe 2324 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2796 4520 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 82 PID 4520 wrote to memory of 2796 4520 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 82 PID 4520 wrote to memory of 2796 4520 aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe 82 PID 2796 wrote to memory of 4492 2796 omsecor.exe 92 PID 2796 wrote to memory of 4492 2796 omsecor.exe 92 PID 2796 wrote to memory of 4492 2796 omsecor.exe 92 PID 4492 wrote to memory of 2324 4492 omsecor.exe 93 PID 4492 wrote to memory of 2324 4492 omsecor.exe 93 PID 4492 wrote to memory of 2324 4492 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe"C:\Users\Admin\AppData\Local\Temp\aef46e2f956e6ec7cd0b6d322e6d99895b00ef7fc9ec2c88ad51f84164a68755N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ed5074147d150fd42db8bbdbf363b10b
SHA1680c67d171d9eaf0a7553f4307f625c63260b842
SHA256ae31581a3f8835253a55b83478b53840d0725a8175eef71e6f76b56d06089303
SHA512f0d2d52d57a1f17e2c5ceae503a1f8bbaacbbd66e6ef2bf7ef190d9d7abe918ab86a8f056d9c746dcf2491512add70e7a746df0ec31659efa7bdfb37869c1b8e
-
Filesize
80KB
MD5d214a002d9b5dfea595db8c4fcfb1e38
SHA165b38b571c758c57de4a836c63c1fd6e089cbc80
SHA256ea23b045e0c0afabe4084016b3701135776e19a5f1afffa97533abcd8395cdd4
SHA5122eeeb3746a4cc95ffe8ef27d8f2ee203c2a5da357fd19a805e791cb27c73450d6cacfe97e708ea3947f10a720b45e089d0a190ad7ab151ffee9129db89a7458c
-
Filesize
80KB
MD5f9b2f4fe1e0ae7007bc002324033aadb
SHA1dbd981127a9d6051c95e7f2bfa8f6daf7a7106ec
SHA256084df8b2f93f98dda82fcf7dd883bfdafb7c1d7b4355753b1b51697208433458
SHA512b3cf91c9161aa3b159f52a60efe013e7c6d529c8446964ed75f015528c4e738ea5642f4d193c1fcc120c672036c4a89149621fa3683ee818358f26357502475c