Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 06:03
Behavioral task
behavioral1
Sample
3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe
Resource
win7-20241010-en
General
-
Target
3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe
-
Size
90KB
-
MD5
bea6503488efd1cfc9f2318255e70b87
-
SHA1
91a18d94a1e46ddf1e351c34b8cddb52fe31fb7a
-
SHA256
3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3
-
SHA512
9841a51653c6730ba918f3d8094994c991b6e21e6c095d8f524890dac32190d745158cfd4ec1288e3f9e249a5b0203814c99e89114c071e9ecbf4401e0d8921c
-
SSDEEP
768:zMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAO:zbIvYvZEyFKF6N4aS5AQmZTl/5G
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4964 omsecor.exe 1824 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 4964 1756 3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe 82 PID 1756 wrote to memory of 4964 1756 3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe 82 PID 1756 wrote to memory of 4964 1756 3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe 82 PID 4964 wrote to memory of 1824 4964 omsecor.exe 92 PID 4964 wrote to memory of 1824 4964 omsecor.exe 92 PID 4964 wrote to memory of 1824 4964 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe"C:\Users\Admin\AppData\Local\Temp\3ff2f5de3a8b59b3da294f20769a573708f927230f15a9e0f1273c51d851a9f3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD508820a1706cb23d92fcf11792e21f2cf
SHA10596f70b2903cb62e1743bad0268596b6655eeb7
SHA256a32c8c5ef136f3eb6f7c0d70888a18f06eae63813e58cde45ba3ea0d58fbe048
SHA512cff533f77722f9678b996f466823dfb7c6c7cc458270933b9ad38d00bc396d93b72543285e4ef16d798c91a89a365c13401e9de4a6d6d8f07a9f6b69f69b3e5f
-
Filesize
90KB
MD566271573ef38656bc1839d14b22a90a7
SHA14a0df715ce96e7dbdd43adff6e039cfa88756bb8
SHA25632d6523acc9b56d3d2d53c626af2950736102848ca42cc22006e5f73083362e8
SHA512e036297cb590c2be7d6d298dde73416363bd31397c8a740cecb05c89122d85202eddcf5e1f9bf62ed5750c7ef4934b5cbc4ecd5f3e1674df31bfe1b42d96b55e