Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 15:46
Behavioral task
behavioral1
Sample
52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe
Resource
win7-20240903-en
General
-
Target
52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe
-
Size
61KB
-
MD5
35ee24e737e63d87c27fa95ee96c7360
-
SHA1
aa84de4d09780c3df094825a5e0644398a1b8bd9
-
SHA256
52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02
-
SHA512
06563c4edcbf12afb6c8b0ec179fdefc16196be9f8f36d48c5ea6f7b9b95a84ba9597095b3e740ace153f9460edfda004c697700e89bbe90dc72e0aa471c7d95
-
SSDEEP
1536:bd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZ1l/5:rdseIOMEZEyFjEOFqTiQmXl/5
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2176 omsecor.exe 2808 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3680 wrote to memory of 2176 3680 52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe 82 PID 3680 wrote to memory of 2176 3680 52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe 82 PID 3680 wrote to memory of 2176 3680 52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe 82 PID 2176 wrote to memory of 2808 2176 omsecor.exe 92 PID 2176 wrote to memory of 2808 2176 omsecor.exe 92 PID 2176 wrote to memory of 2808 2176 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe"C:\Users\Admin\AppData\Local\Temp\52ee358f4b6e0c872d5a4fe0c353ea32d602ede3d166ce370ad411e5b1185e02N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5577f059c6c48fc39a92e302ef3b7349b
SHA1f0674c888ec23370f1db3081da5ce7cb54b6ba24
SHA2562901f24c3a56f741b47f4d5c9f93345f427bf0998f5c6c3e1d0bca2e19f39a63
SHA512062ac56d31a62051d3dacb592a716cc0a38ed403e7bf00d54eae412d5648e9f35f3bc0a297d5167d8b383e325b2ad364cbc2ec9bf7361f58d151963a7d048651
-
Filesize
61KB
MD5f1ad5d30f361cecdd7555fde90764515
SHA10117a539c9ac45e8b729e2980b42cfc84e73a605
SHA25688370493951beb6c2358ee6fff163daebd7bcb7c1866d966b8042cd7274bf990
SHA512d4eb0d709765e93d5cb9a55cd560dbf5779a6b651697fef16a5f085e11b63142e32623f7eb4954d6637e3be98929fd6a08a6380db7726712d625680ca5670f30