Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2025 04:48
Behavioral task
behavioral1
Sample
c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe
Resource
win7-20240903-en
General
-
Target
c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe
-
Size
76KB
-
MD5
4d30c5bc4500c5f74c2a4886ba809b12
-
SHA1
d4c8acc8caccd6bb4336d203646085cbc29794bf
-
SHA256
c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8
-
SHA512
2fcc8a37ed1bbe8ccc81ed94ce4cc3e2b0c2206a0145db47cbb7edd0456f0c38cec025eb239bf80998a8af01d9b32617e64892dd2da60d71ec2a47a97e73bd1a
-
SSDEEP
1536:Dd9dseIOcE93bIvYvZEyF4EEOF6N4XS+AQmZTl/5w11f:jdseIOMEZEyFjEOFqaiQm5l/5w11f
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2984 omsecor.exe 4488 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2984 4644 c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe 82 PID 4644 wrote to memory of 2984 4644 c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe 82 PID 4644 wrote to memory of 2984 4644 c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe 82 PID 2984 wrote to memory of 4488 2984 omsecor.exe 92 PID 2984 wrote to memory of 4488 2984 omsecor.exe 92 PID 2984 wrote to memory of 4488 2984 omsecor.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe"C:\Users\Admin\AppData\Local\Temp\c712a98a2856203c1a98e77ac667ff7badbdd9ffa595490512b8196b084689c8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD57bc211b46151025a4454e18b5a64535e
SHA1532295e91edc31f9133db7891950def5db9b32d2
SHA256fb521bf188bf7fb1632cc20f374823ad75353d961d02185eb28b476ec42253a2
SHA5128c0138ccb2bdcbbe322cbf0d1924788ad5a4e8cfa1ad063ba35a4f7af85c6522a70f8cc51ca465ee12d354af9738a09c1254a7e8bccb30c84ed8ce7f11f30337
-
Filesize
76KB
MD5c21a49acc3ed2b6bb906e94bc03d9fce
SHA1973dbed2a7dcd4686ecc4d607156e02703af7484
SHA2566208dadb2794f7fcc8a3a6b88de430e50b362e35e84e9e66e00951a9468fe39b
SHA51285f99cd6b6367b4a7f3486a17de28d208c8c52f469bc1a6e5e7ab7ac458bc06619404eb330bfb6a6e411bd4cd173fff79cc36a6769bf2dcf0061c5028d4f47c6