Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 01:23
Behavioral task
behavioral1
Sample
fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe
Resource
win7-20240903-en
General
-
Target
fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe
-
Size
61KB
-
MD5
aef12e5b9612fb334ce7510c220fdd29
-
SHA1
8e0ca52f347b5c1096b2f66e643ddde271975618
-
SHA256
fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4
-
SHA512
5884d4e2c9e4f6047d8606cd38ba75dd61a7098612e24830bd4872422853093a6215f053dbc7e19801ef86abf18ec31becaefaa5d52937978d7285d180958a6e
-
SSDEEP
1536:bd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ1l/5t:rdseIOMEZEyFjEOFqTiQmXl/5t
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1936 omsecor.exe 3080 omsecor.exe 1664 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1936 1396 fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe 85 PID 1396 wrote to memory of 1936 1396 fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe 85 PID 1396 wrote to memory of 1936 1396 fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe 85 PID 1936 wrote to memory of 3080 1936 omsecor.exe 102 PID 1936 wrote to memory of 3080 1936 omsecor.exe 102 PID 1936 wrote to memory of 3080 1936 omsecor.exe 102 PID 3080 wrote to memory of 1664 3080 omsecor.exe 103 PID 3080 wrote to memory of 1664 3080 omsecor.exe 103 PID 3080 wrote to memory of 1664 3080 omsecor.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe"C:\Users\Admin\AppData\Local\Temp\fad56a85fec904b987209ea41c906099189f48e0bfdd40b99423ae3d867b13d4.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD56070ec7d343a66283294dd04a601efd2
SHA114d8e7aace75381d3477062d9603eace43a5196f
SHA2565683ab6f4023419846f718e87735e4b730b65767e1ce7ab9dcd5b635e947dd82
SHA512119c41c6524ce2536b6db28c69a7684aaf1d8afd67d5e56ee07da2987354892504b22308cd11aea7a9482c9e0bc7ee7d62fd28e99337a2508ff472c95a64613a
-
Filesize
61KB
MD5d7f3e1012e6322c41b54160589d3188c
SHA1225d8d600d508be21de2596a387a9cf93697f8fe
SHA25605b7a82974ed52549bec257d41995a96d809578205441efc1c3eae1b25d26795
SHA512cf8eb63ab61b872d45f77887e79c0c6f73af44003fb4c60b37384b28007a5049464ee229847273b9dba0b171a6729d64de86052106d317788a3d8067e0c44651
-
Filesize
61KB
MD5afd33b4cba503ce21039d8ceafc00cef
SHA16bc8b2ea7cc229a61da4af6cc30b0e3a59b41781
SHA2567d40103012876cbccaa4bc69058a5bd988936f4feb16da02283367d10bc5a165
SHA51284ef69ddc0e69ae7e89383e1c3eef1545e690581d981c9d105591e37eef5b9fcc31ef9cba05fc74a4295c34fe518d9ffa6ab818f803667854b6447a726dc8f9f