Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2025, 04:38
Behavioral task
behavioral1
Sample
afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe
Resource
win7-20241010-en
General
-
Target
afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe
-
Size
80KB
-
MD5
5f37185a894e45cbde1eed03f43d8ddd
-
SHA1
b199139af55a447b1ff2a4f8bf7d7085ac2035ea
-
SHA256
afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec
-
SHA512
bde058e8bd10231e12572536fdd6a8c47798df152d7ce518498fd843df6158c1eec6dcd5b274b70e1736d54ad51dc11c76c8cdfd7062e056c438f6e7a749706d
-
SSDEEP
1536:jd9dseIOcE93bIvYvZEyF4EEOF6N4yS+AQmZcl/52izbR9XwzB:DdseIOMEZEyFjEOFqTiQmOl/5xPvwN
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2636 omsecor.exe 2332 omsecor.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe File opened for modification C:\Windows\SysWOW64\merocz.xc6 omsecor.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2636 4672 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 81 PID 4672 wrote to memory of 2636 4672 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 81 PID 4672 wrote to memory of 2636 4672 afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe 81 PID 2636 wrote to memory of 2332 2636 omsecor.exe 82 PID 2636 wrote to memory of 2332 2636 omsecor.exe 82 PID 2636 wrote to memory of 2332 2636 omsecor.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe"C:\Users\Admin\AppData\Local\Temp\afc86eadd84cdb3bc80f8b84eec0831a80711e0afe2f9cb1877134758a51f8ec.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2332
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD58cae328c26921608221cec925a9ea554
SHA1697acdd8f360d5aacf94f0928c81eb04225bcc07
SHA2562cf31c4f624970c2e587eca799212dba60b29d48bdd3f729e46538e7dedd64ea
SHA512978fff2a5b631d8a8366a32dba4859624353f2bf15d183e79ab10fa5b147156eb3e7b5ad0848a0163668e968c6fc7aeb8d69e4d0bc2a6ac80f309894450f5aaf
-
Filesize
80KB
MD5ba27b2a3d6148e0d6d919513d05cfd59
SHA1556005d6612673b29bd956f7017a747c285ce76f
SHA25601fb4ecf29bbe288ef4b71d1f0659818a6355cec60ab7c5d07ab91539d39bf43
SHA51262a603adc37b3d813506a820d98fcf9e7a7905ab3b81d7acc6685e724207d17d8b0c797ddd71be2bc9774c1672cf5b34bb753d35de517693259118f3fb9cf239