Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 11:54
Behavioral task
behavioral1
Sample
b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe
Resource
win7-20240903-en
General
-
Target
b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe
-
Size
65KB
-
MD5
e46be8d0d00de9b46935c8980d1f3079
-
SHA1
4c639e0805c24b7ec0d7ae07a312927057ed4b08
-
SHA256
b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c
-
SHA512
72fadf5d855a0a83276c5abdd96dd87988baea45706911f0990b6211e8338c2097eab427b66bda0dc6ea5331cc160b79fc3ab33ef434bb50f2d8dfccae1a1d99
-
SSDEEP
1536:nd9dseIOc+93bIvYvZEyF4EEOF6N4yS+AQmZ/Hzw:PdseIO+EZEyFjEOFqTiQmRHzw
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 3248 omsecor.exe 2900 omsecor.exe 456 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3172 wrote to memory of 3248 3172 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 85 PID 3172 wrote to memory of 3248 3172 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 85 PID 3172 wrote to memory of 3248 3172 b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe 85 PID 3248 wrote to memory of 2900 3248 omsecor.exe 103 PID 3248 wrote to memory of 2900 3248 omsecor.exe 103 PID 3248 wrote to memory of 2900 3248 omsecor.exe 103 PID 2900 wrote to memory of 456 2900 omsecor.exe 104 PID 2900 wrote to memory of 456 2900 omsecor.exe 104 PID 2900 wrote to memory of 456 2900 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe"C:\Users\Admin\AppData\Local\Temp\b7dab9c3da03335d977cb817cb89971188029765a71b495fcf92974d22c4538c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD55c5d5864c4ec923d748f66b32c11c82d
SHA16f8848cf3162fedd1470a7e1862da9ec9846061c
SHA256d6f503c8e6337dbbdc9c993788c15381e548055e59f1150f3d65ba9c531feb63
SHA512bae5aeaa94f33c8e614d4e37fbeb9f198c830b6a260bdd4265573091afda6f3f3004c3c0bf721a02825919b31d1ce1df34c9c22bb14610a06bf8c7ea32bf9def
-
Filesize
65KB
MD503ba3b3a97ac91407bd8e7ba9b5d6fad
SHA1d4d62070bd94a4f565e3fb4805411022396ae477
SHA25631ad91b5f81e01e0520e02ea6f0d5c72e4a02f8db4391c88276db4284be8de24
SHA512b2e8954b5c63a0ee34c76e2bfaec120a009eedada320631ac4f724470eb72c4fee11a640850ed0537645556be2296749fae3576e68bca4f20b98836e7bd8472b
-
Filesize
65KB
MD50fe3f6b300447be4b972378e48f1a4f3
SHA1307b5dcedc8e5d328f1d5797af994a054199eb47
SHA25661a5f31d49e4fcbf5de1cf699810ba590449947c337acc5b908ffa8e196a6198
SHA512ed1dfef1ab5fee5bfa262fc8cc9677c39823e8bb9b643db23f9e4251555e844d4ca07744a24cfcd3bf0403a000d3dd00a5f3382ae9064922efcf6c1341755234