Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 00:58
Behavioral task
behavioral1
Sample
94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe
Resource
win7-20241010-en
General
-
Target
94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe
-
Size
80KB
-
MD5
894262470ec2d9f77994e9f2bb2c4aa9
-
SHA1
b8f803e1f56c5c15132414a12cc563459e178013
-
SHA256
94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209
-
SHA512
38eb54f81db4b0c9c84c3f1521ed976306de1ae0815a414fe3a8443aeb51867f52aaa84789fd074a3bb76c50d6163d057d98cd6b1e0a277171e84a55f9f68e98
-
SSDEEP
768:qfMEIvFGvZEr8LFK0ic46N47eSdYAHwmZGp6JXXlaa5uAK:qfbIvYvZEyFKF6N4yS+AQmZTl/5S
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 4504 omsecor.exe 4408 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2956 wrote to memory of 4504 2956 94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe 83 PID 2956 wrote to memory of 4504 2956 94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe 83 PID 2956 wrote to memory of 4504 2956 94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe 83 PID 4504 wrote to memory of 4408 4504 omsecor.exe 100 PID 4504 wrote to memory of 4408 4504 omsecor.exe 100 PID 4504 wrote to memory of 4408 4504 omsecor.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe"C:\Users\Admin\AppData\Local\Temp\94035503f1f7c74d5b472826d91427fbe8070d789a82a749b4e10d8953675209.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD52588aa549ec9376c08ad8bfa60751ada
SHA1faf51ca3d8152dff6eeda38c50b1b8dcb54d0940
SHA256e43b856bb073d6471caf1f020f55e53c626a24e21284d1f080e32e32298b1fed
SHA5128acb573c30b86af1dcc7475eac8d66303cfc70413492f81bb2c9893e0afce23602f8ecda767680749ca5322aa2dced37ef1aff5896151736cc7cec0eeea13ba9
-
Filesize
80KB
MD59ae8f13dccac886f24842d55a7b689df
SHA1d6dea147e4cf421d45cc4494e9d13fe8c6d59e9b
SHA2560992bcba2cc8f7c49ac0716e7112c7b6e999738b3d52d718b079d82f25c0dbda
SHA512afb153295a33cee7cb9db933d43310d50f4fd64787e989a3cc831bd7a4b16d3cfc664f17a06b2a3bf46351cb130ce1bab9973723df0c9062b3eec97652fd8725