Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 05:28
Behavioral task
behavioral1
Sample
073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe
Resource
win7-20240708-en
General
-
Target
073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe
-
Size
72KB
-
MD5
c52359b57f84782b520914960b104280
-
SHA1
b3c7572130f877d941f565eb6690af8e835d6dd3
-
SHA256
073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edb
-
SHA512
16b8dbe49fda6f9478ce02268db009b1235c277a04f153dde740701bbe351ac1aabe2d5e43d60230753bdcbf9103589bf00eb8ff50ca79034813369cdb5e5757
-
SSDEEP
1536:vd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZTl/5211t:HdseIOMEZEyFjEOFqTiQm5l/5211t
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 3 IoCs
pid Process 1644 omsecor.exe 2684 omsecor.exe 3492 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 384 wrote to memory of 1644 384 073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe 84 PID 384 wrote to memory of 1644 384 073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe 84 PID 384 wrote to memory of 1644 384 073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe 84 PID 1644 wrote to memory of 2684 1644 omsecor.exe 91 PID 1644 wrote to memory of 2684 1644 omsecor.exe 91 PID 1644 wrote to memory of 2684 1644 omsecor.exe 91 PID 2684 wrote to memory of 3492 2684 omsecor.exe 92 PID 2684 wrote to memory of 3492 2684 omsecor.exe 92 PID 2684 wrote to memory of 3492 2684 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe"C:\Users\Admin\AppData\Local\Temp\073b1222a5f6399a945b64f0cf9810a5cc639552b1eeccd351a845e097aa7edbN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD579cf2597f70c1b52b8f0e7c5f3f201b4
SHA13793346ccd8c564c026cc3b8fd228398f756d22b
SHA256827e65dbd18b31814a302cd42919afcf6e8ebfb25462cdb83518a618f515f0d9
SHA512088073afa8e80aaf99d72f0c5e0c674872804281f508299959b4e47cc1e640b72605394fcf3170b0f6d6bda2deef680378e80de081974160e4601a0d62d36cfb
-
Filesize
72KB
MD51eaee24b01bee2ddb2c26d08a0288358
SHA15156f45f4db92df034d09baa78333ece1efc3f72
SHA25613e36bb15ada6d25417ab6d6ac4c7758fedb27eb93c8370b65385791ce158ad2
SHA51271ac2040e9499775833316190f2e366a5b57b4dc512863eb98de2856967fa92ed0bb57f937ff819ab763061aa7eb87e86f912fda6541a46f6bad1432f939f491
-
Filesize
72KB
MD59824759878c77d975fef665a776b8785
SHA158c3f3f156a092bb94b447e7fce5973441742f43
SHA25650ae3b0f35c2e16549146add76e4f7cd1e496eeb761e819c6c6988c43415806f
SHA51225ac7c193d283ccd55634e9cfa22a10905949c5cea3482609b47d9530b26a74209cef3ac61e18a03efcbe9365be6b41ff3e94ed98f8f5e85393d478e63763b7d