Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 16:17
Behavioral task
behavioral1
Sample
64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe
Resource
win7-20241023-en
General
-
Target
64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe
-
Size
90KB
-
MD5
d107fc042b5772eada707db66bbb8bc0
-
SHA1
13ac55c317d231c21911c8abbffe8dfc3eefea51
-
SHA256
64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6d
-
SHA512
65711f64f0365f540596b1f5f51953cdbedfe7bfdc913d6dc2c56fa9c90c4451076972fcd0eb42dfd2b3685524519c7b091bb6ad667f88b5ced91b6622842fb7
-
SSDEEP
768:vMEIvFGvZEr8LFK0ic46N4zeSdPAHwmZGp6JXXlaa5uAu:vbIvYvZEyFKF6N4aS5AQmZTl/5m
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1172 omsecor.exe 1936 omsecor.exe 2392 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1172 1336 64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe 82 PID 1336 wrote to memory of 1172 1336 64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe 82 PID 1336 wrote to memory of 1172 1336 64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe 82 PID 1172 wrote to memory of 1936 1172 omsecor.exe 92 PID 1172 wrote to memory of 1936 1172 omsecor.exe 92 PID 1172 wrote to memory of 1936 1172 omsecor.exe 92 PID 1936 wrote to memory of 2392 1936 omsecor.exe 93 PID 1936 wrote to memory of 2392 1936 omsecor.exe 93 PID 1936 wrote to memory of 2392 1936 omsecor.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe"C:\Users\Admin\AppData\Local\Temp\64e2ab9474aca2fa5e5b9d9dd229f44c1b80784aa06c370a8d1349a418695b6dN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
90KB
MD5a40f0ad4bc4c793a08fa124e34cd1d11
SHA1bb1da4dafcace4796b96965c8904bdde34849299
SHA2569e01de7e0fa3b1412b99ac475d79de72f68942aaab3545b2493baf3d2bd0b439
SHA5121c6362b033eccf77c382d8c9975aecabf4ac66f009e864e456084e1554338726ae8e7b0946a203ce9dc6aadd289b2f2e9a55bc2c951412bbe665112ea34e7b39
-
Filesize
90KB
MD54483ddf3ef1647f0444abc64651b7b91
SHA1a0f0aa62f31cfc1d5191226d47254c0c3a4f54a0
SHA256583aa612cac1aad79e092e2fde5080d253a0255378b68beb35d521cba5b53fd6
SHA51237df7f08038ee2acfaef3ecc4f7d9e422b61868259e62bb320488a7216a41bd263fcde4a37d494c303b61da3f171b5a106f8d9521a6ec9ae4f4460ca97d69254
-
Filesize
90KB
MD520ad3b499120119deee9d3ebc78e516e
SHA1bce234c0d5f516559026cf2ecac0a39d49940ec3
SHA2567c8e8774171e2210f306ba4d2e524cda9fb9beec667492a0dc5400f962fa023e
SHA512900509bd31144d19fbb2c073a4e06a16cf395fc5b5c9749bdfd70c057218a2b632c14c345eff4ac3ce465233b96c84366aa07e08a5d908da1f839afa6b1df560