Analysis
-
max time kernel
116s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 15:37
Behavioral task
behavioral1
Sample
065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe
Resource
win7-20240903-en
General
-
Target
065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe
-
Size
76KB
-
MD5
81fcbbf335f57c98713f9ed7cbde61c0
-
SHA1
fd441e63eba1e52c49fe0a4c746cb68177af9979
-
SHA256
065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76b
-
SHA512
c9476c644af262c4c9339b82d913922e867e91994512523624cf7675db5be265ce495c7b4493e5d0ae4ce877587371acb6d2197481fe92346f65c1b197f38760
-
SSDEEP
1536:cd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11f:kdseIOMEZEyFjEOFqaiQm5l/5w11f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2828 omsecor.exe 2664 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2828 2848 065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe 82 PID 2848 wrote to memory of 2828 2848 065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe 82 PID 2848 wrote to memory of 2828 2848 065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe 82 PID 2828 wrote to memory of 2664 2828 omsecor.exe 92 PID 2828 wrote to memory of 2664 2828 omsecor.exe 92 PID 2828 wrote to memory of 2664 2828 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe"C:\Users\Admin\AppData\Local\Temp\065b3fb2f322d9e92e331a016e3e71302c9061925422ac41deac61fc7a34f76bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5f64ea2fa9bb76fd9e3ed2ff36e05b04a
SHA13be7d2a55f38d6775c907fcea19caf6d3582a640
SHA256acf5f3357654db076d1dd24e3bef84d9f7b4c16a07f0a742ff16c35e6bda865e
SHA51243d16429e8972fec08404737316ffee1e792120d586d5e6362986d9f10b7192d1763c1e13b6affabd66aac73cd8a99b0d13f9969a19dc5f15fe96eb39dacd6ce
-
Filesize
76KB
MD5e53845424aaeab9aaeb8df3332e786af
SHA1325ec57ff6939af482c2289478326d4f831165c2
SHA256eab31f76102e1be6439c1e212478cb71ee314bcdf71447a0aacfdcae449c25aa
SHA5121da280b64a990a8e4f479e78306a4a459bde63f3d2655115639243737196df24b8f61c1608e9119cfaaedca72416271d3ffa86a6844375b196058dc66f14b48f