Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 21:38
Behavioral task
behavioral1
Sample
ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe
Resource
win7-20241023-en
General
-
Target
ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe
-
Size
61KB
-
MD5
7359492f788df1f863ca9cb1107fe99d
-
SHA1
fa5027dbb7584cedafea45cae2c2d8a678078905
-
SHA256
ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f
-
SHA512
f44d84d96ee58028ef625356bf45db9ae92fd174fc41da6a3d0b8c6626720068083bf47c043d61bedfee7a2adad981c3fa14594deb1bee95a04190c70fc5e515
-
SSDEEP
1536:Ld9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZxl/5f:7dseIOMEZEyFjEOFqTiQmTl/5f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 448 omsecor.exe 1532 omsecor.exe 4044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3316 wrote to memory of 448 3316 ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe 85 PID 3316 wrote to memory of 448 3316 ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe 85 PID 3316 wrote to memory of 448 3316 ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe 85 PID 448 wrote to memory of 1532 448 omsecor.exe 103 PID 448 wrote to memory of 1532 448 omsecor.exe 103 PID 448 wrote to memory of 1532 448 omsecor.exe 103 PID 1532 wrote to memory of 4044 1532 omsecor.exe 104 PID 1532 wrote to memory of 4044 1532 omsecor.exe 104 PID 1532 wrote to memory of 4044 1532 omsecor.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe"C:\Users\Admin\AppData\Local\Temp\ffb526fc92007ca7be56fe7a718f2a024289039d34aa261765cf65b910cd526f.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD59f99cf081b18185462fa36ca9699a3d7
SHA135238b2ac7345912d6a6393e637099488c7f8695
SHA25685cf1db0ebd5e307f3a2804fc3a91678a1ee274632b7041549e62dd415cf7fa0
SHA512be3453729c20e189b4d3cb7e2a2320f5e36ee63636c5ca068abf057cfbcd5b725541ca0d19bff0d714d7dc94d0cc0c81a053616dd6d522514d60fcb04c66a162
-
Filesize
61KB
MD59cde4814b524ea9feac0fe487b831323
SHA18c6e8c48367d09f34aba645cd2918d7bab50d307
SHA256c8acce3b3841f3f80b90ba127c9b7eb014c875480c7dd8b453875d2b07ff1778
SHA512fbe1cca47f39c12305adc477ba1172cb817bae2f6cbeda328a392284a171332faa2ce8479156bfbda13f7c8616164d7339aa89b8437896512785c431405a5c24
-
Filesize
61KB
MD5a80a642551f4874f1b7a581d826b8140
SHA101f40618d3963814af98986db1d53ea3a0d1b4be
SHA25615a85039d1d89c115e44fd7c5212620bb9f0a9bf4edafc77fea65de5b9eda945
SHA512a2b7eafd2dcaeb816c414f711341d5210abc6b2ca9135a878b8426de3add2a1ce81255d36cedefa3a2eeb985230dcae192b9474c7e52fc76643f0140b1018c3b