Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 01:49
Behavioral task
behavioral1
Sample
969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe
Resource
win7-20240903-en
General
-
Target
969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe
-
Size
71KB
-
MD5
dc8dfbc3f298dc544328b84582b162ac
-
SHA1
f1e12fd2b377fea6bbeffe5e9124ed4f433ea8c6
-
SHA256
969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89
-
SHA512
e507027f461941fe6b38b865cbe4c1e6504492f5283de9c0845e7a87e4b9c753790e107aa77282a2a5aa08bd1d7abb5c3dfe978a8ba7b847e067e4e36ff50911
-
SSDEEP
1536:rd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZSDHIbHH:bdseIOMEZEyFjEOFqTiQmQDHIbHH
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2128 omsecor.exe 1472 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 560 wrote to memory of 2128 560 969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe 83 PID 560 wrote to memory of 2128 560 969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe 83 PID 560 wrote to memory of 2128 560 969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe 83 PID 2128 wrote to memory of 1472 2128 omsecor.exe 100 PID 2128 wrote to memory of 1472 2128 omsecor.exe 100 PID 2128 wrote to memory of 1472 2128 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe"C:\Users\Admin\AppData\Local\Temp\969f1f47607318556206ba2fe8d18ca3e2554181a6e29473c2b8f02a2e73ea89.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1472
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD597101c8c87846fbd4ed5f7b918e6eedd
SHA19bb182866faf0606b281b96403f412d0a27fb200
SHA25616877a02ef9dca6518dbcd57a839a1c2fa04d322a97ca4c93728bdf04a5eb9ee
SHA5125de18671f970dd94e880a59847f42d4e9458135ae4751a28a9c503a8a2b8b35e89a25e1900d6489500ae8ea5f874a75fdf7b26d7445175909c4d6d43e3bd9b5c
-
Filesize
71KB
MD5d866cf46befe6c90a644d9db837dccd8
SHA1d965a73e775cd25d6a8dbcb2bc509df44f18835d
SHA256f0c198fb7d9d83900a99e5e4433487c9090681e67238fae22929d3885a8ad110
SHA51238132546c5528bbb7862d00e32eb80fed74a0df340b0b5a23c7e749c0d993cddaa418a9e0d03335347160f737b97ee7465333fa80a9a91280f8a53c9c01f0799