Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 02:52
Behavioral task
behavioral1
Sample
88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe
Resource
win7-20241010-en
General
-
Target
88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe
-
Size
71KB
-
MD5
e8dc9d201c76c5bb9382f4d38a4999dd
-
SHA1
2d159067ac6b373305858c39b0b7b13fb47b7200
-
SHA256
88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93
-
SHA512
39930cd1a9e39bdb2ea261a9ed82fa177dc355cce55a416e6d658d85c10581b430a23a93ed3fe30538823c641dc3282dde149587f425b8490e10e2b5c2488fe1
-
SSDEEP
1536:yd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHX:CdseIOMEZEyFjEOFqTiQmQDHIbHX
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2548 omsecor.exe 1412 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3224 wrote to memory of 2548 3224 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 82 PID 3224 wrote to memory of 2548 3224 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 82 PID 3224 wrote to memory of 2548 3224 88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe 82 PID 2548 wrote to memory of 1412 2548 omsecor.exe 92 PID 2548 wrote to memory of 1412 2548 omsecor.exe 92 PID 2548 wrote to memory of 1412 2548 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe"C:\Users\Admin\AppData\Local\Temp\88c0991cf5a3d175eb1f1cedc9186ffd7fa27621a4500f99d9cb580d24304c93.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD54ba1b7311a99bf6ec55a71d80e3bfcd4
SHA178ac1febd0646a20b388cdcde2f4cc12538d5c3d
SHA256d8bd9054f946aebaa67433dac36660f2d10941345451f93ded706bdd58edcab2
SHA51242e42c53a2afaa8d6876ca8d023b111b3e0ef8ae28b97def10c6161b43522c73a2a7d4c877de0d0c9cdd48d9b4731f14e8ba7bd5acde648ab26292f9ced3768c
-
Filesize
71KB
MD58b0573320af002ecb63efc80a5a2537e
SHA10df918d3861288f35cdc288afc30b021d9f97891
SHA256fa9dc8f50b4bd499e163ed5a968760b5d62d5ca657f5e257f618572136cc1de0
SHA51242f78460d3a8d3a2617ce1c625deda0dd251aed6804a64ca5c2de1cb4561cab27105091c4f4f93026c4f7c115404fd3f33332aac140ad959648caa3642164a3e