Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 02:52
Static task
static1
Behavioral task
behavioral1
Sample
41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe
Resource
win7-20240903-en
General
-
Target
41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe
-
Size
33KB
-
MD5
93503f48189b4a010ed4df298b50559b
-
SHA1
e3c171b26db84355351c73502ac647853020a9f2
-
SHA256
41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e
-
SHA512
2054fe826e9a140d099361ff96b6ca888a84e9c8b6c854e053a919439cac9d10488b36082e4029f392c8a916708f677c7771a71b29d6b18f4948a9f82cbed542
-
SSDEEP
768:afVhP/4kt3+9IV6Y90ksQ1oWHT0hh0vy9S5fsYGbTmoN/yE56hlSQ7D1:afVRztyHo8QNHTk0qE5fslvN/956qo
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4440 omsecor.exe 736 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4440 4588 41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe 82 PID 4588 wrote to memory of 4440 4588 41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe 82 PID 4588 wrote to memory of 4440 4588 41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe 82 PID 4440 wrote to memory of 736 4440 omsecor.exe 92 PID 4440 wrote to memory of 736 4440 omsecor.exe 92 PID 4440 wrote to memory of 736 4440 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe"C:\Users\Admin\AppData\Local\Temp\41fb31a9a4910cb83dc52cd4eba3947e9f460db8be3c145b0e3f2d8554c1696e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD520e0edd9b3ab5e21a83bf68228bb94a5
SHA194734dbc80eac3c9660841ff091e4a032861e355
SHA256e11170fec5bfc1eab3f1933867db49cf579431030d6576d56350b7fd73fd788b
SHA512bd78629ca209100c710554f12d76cfd6f5d488616e489179d3fd3370ba15012691732a3a8cead714d64134e896921818b744454c3dfc95307ee25b04a2b3ad10
-
Filesize
33KB
MD5e4e94c2319f7cf2244157c90071396cb
SHA1c82e51e2210d2974e675e61599cfb044402f7ed1
SHA256a02a9720bc62b7135046e46bad2abffbc0b926f9f6bfa124ea071dfbfc39f1c7
SHA512687a95551d8bae189b1df348ed08ab08b7b1fa53c7fb633b2237a6aa4dc595a9c2cb4cf0393ab5372826a96ed574b533f458e1397625f67540993dcd12c64481