Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 23:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.541c7d11f0f3739d35437153c4329670.exe
Resource
win7-20231023-en
General
-
Target
NEAS.541c7d11f0f3739d35437153c4329670.exe
-
Size
134KB
-
MD5
541c7d11f0f3739d35437153c4329670
-
SHA1
0046e4b6cb3b1f579d01df55877dcf5cf9ef59d4
-
SHA256
9e2f32e6a66f3f6a79928ba8b77e411b64dbe3377f27a264c7931e7f58d80bf0
-
SHA512
26a51dfe3ebdf96c217c1b80a3983f0dbfe8bbd891b14bf830226ff18842bc14357f776af3069cd17bf204f20829fe7f04fd00cbcd381ed41cb83f409b4048fe
-
SSDEEP
1536:hDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7M:BiRTeH0NqAW6J6f1tqF6dngNmaZC7M
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 1708 omsecor.exe 2340 omsecor.exe 2968 omsecor.exe 768 omsecor.exe 3008 omsecor.exe 2076 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2148 NEAS.541c7d11f0f3739d35437153c4329670.exe 2148 NEAS.541c7d11f0f3739d35437153c4329670.exe 1708 omsecor.exe 2340 omsecor.exe 2340 omsecor.exe 768 omsecor.exe 768 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1408 set thread context of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 1708 set thread context of 2340 1708 omsecor.exe 30 PID 2968 set thread context of 768 2968 omsecor.exe 35 PID 3008 set thread context of 2076 3008 omsecor.exe 37 -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1408 wrote to memory of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 1408 wrote to memory of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 1408 wrote to memory of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 1408 wrote to memory of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 1408 wrote to memory of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 1408 wrote to memory of 2148 1408 NEAS.541c7d11f0f3739d35437153c4329670.exe 28 PID 2148 wrote to memory of 1708 2148 NEAS.541c7d11f0f3739d35437153c4329670.exe 29 PID 2148 wrote to memory of 1708 2148 NEAS.541c7d11f0f3739d35437153c4329670.exe 29 PID 2148 wrote to memory of 1708 2148 NEAS.541c7d11f0f3739d35437153c4329670.exe 29 PID 2148 wrote to memory of 1708 2148 NEAS.541c7d11f0f3739d35437153c4329670.exe 29 PID 1708 wrote to memory of 2340 1708 omsecor.exe 30 PID 1708 wrote to memory of 2340 1708 omsecor.exe 30 PID 1708 wrote to memory of 2340 1708 omsecor.exe 30 PID 1708 wrote to memory of 2340 1708 omsecor.exe 30 PID 1708 wrote to memory of 2340 1708 omsecor.exe 30 PID 1708 wrote to memory of 2340 1708 omsecor.exe 30 PID 2340 wrote to memory of 2968 2340 omsecor.exe 34 PID 2340 wrote to memory of 2968 2340 omsecor.exe 34 PID 2340 wrote to memory of 2968 2340 omsecor.exe 34 PID 2340 wrote to memory of 2968 2340 omsecor.exe 34 PID 2968 wrote to memory of 768 2968 omsecor.exe 35 PID 2968 wrote to memory of 768 2968 omsecor.exe 35 PID 2968 wrote to memory of 768 2968 omsecor.exe 35 PID 2968 wrote to memory of 768 2968 omsecor.exe 35 PID 2968 wrote to memory of 768 2968 omsecor.exe 35 PID 2968 wrote to memory of 768 2968 omsecor.exe 35 PID 768 wrote to memory of 3008 768 omsecor.exe 36 PID 768 wrote to memory of 3008 768 omsecor.exe 36 PID 768 wrote to memory of 3008 768 omsecor.exe 36 PID 768 wrote to memory of 3008 768 omsecor.exe 36 PID 3008 wrote to memory of 2076 3008 omsecor.exe 37 PID 3008 wrote to memory of 2076 3008 omsecor.exe 37 PID 3008 wrote to memory of 2076 3008 omsecor.exe 37 PID 3008 wrote to memory of 2076 3008 omsecor.exe 37 PID 3008 wrote to memory of 2076 3008 omsecor.exe 37 PID 3008 wrote to memory of 2076 3008 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exeC:\Users\Admin\AppData\Local\Temp\NEAS.541c7d11f0f3739d35437153c4329670.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
PID:2076
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD584c567a05314172a6538600bbfc9de48
SHA1fa80a22324f609dc45f670fda587b20a11a6bf54
SHA25606c19827d266900848b40e41de096ff987bf5f1922760001f823acd4389cb911
SHA5123c34e280c51c065a4f38c09a7e7025aa17c69d02e4c6ccc85d5dd61f7321b53f6bd5c2a50ea80c88b629647c23e5a16cb0e65c5db27e7b83cf0d8147e7155fca
-
Filesize
134KB
MD584c567a05314172a6538600bbfc9de48
SHA1fa80a22324f609dc45f670fda587b20a11a6bf54
SHA25606c19827d266900848b40e41de096ff987bf5f1922760001f823acd4389cb911
SHA5123c34e280c51c065a4f38c09a7e7025aa17c69d02e4c6ccc85d5dd61f7321b53f6bd5c2a50ea80c88b629647c23e5a16cb0e65c5db27e7b83cf0d8147e7155fca
-
Filesize
134KB
MD584c567a05314172a6538600bbfc9de48
SHA1fa80a22324f609dc45f670fda587b20a11a6bf54
SHA25606c19827d266900848b40e41de096ff987bf5f1922760001f823acd4389cb911
SHA5123c34e280c51c065a4f38c09a7e7025aa17c69d02e4c6ccc85d5dd61f7321b53f6bd5c2a50ea80c88b629647c23e5a16cb0e65c5db27e7b83cf0d8147e7155fca
-
Filesize
134KB
MD584c567a05314172a6538600bbfc9de48
SHA1fa80a22324f609dc45f670fda587b20a11a6bf54
SHA25606c19827d266900848b40e41de096ff987bf5f1922760001f823acd4389cb911
SHA5123c34e280c51c065a4f38c09a7e7025aa17c69d02e4c6ccc85d5dd61f7321b53f6bd5c2a50ea80c88b629647c23e5a16cb0e65c5db27e7b83cf0d8147e7155fca
-
Filesize
134KB
MD57f5cdf436d9c88aabdf278acf2789b5d
SHA1944dbc55835b6cfd5ea4f245d995faff2ce11b40
SHA2568c79836b0e0f4b810c9048258e15e3deb9258f6900b0def2e1ae6aa9a4c01fc1
SHA5129bdb6f68dc8982a8c0a007181c287c866a9b432a07b874c2fd0e8356b30505646f56d7bc8721ab64d32e5d3bd714c9a68a1aa60dee0af73d88aabf4c00c56cd6
-
Filesize
134KB
MD57f5cdf436d9c88aabdf278acf2789b5d
SHA1944dbc55835b6cfd5ea4f245d995faff2ce11b40
SHA2568c79836b0e0f4b810c9048258e15e3deb9258f6900b0def2e1ae6aa9a4c01fc1
SHA5129bdb6f68dc8982a8c0a007181c287c866a9b432a07b874c2fd0e8356b30505646f56d7bc8721ab64d32e5d3bd714c9a68a1aa60dee0af73d88aabf4c00c56cd6
-
Filesize
134KB
MD57f5cdf436d9c88aabdf278acf2789b5d
SHA1944dbc55835b6cfd5ea4f245d995faff2ce11b40
SHA2568c79836b0e0f4b810c9048258e15e3deb9258f6900b0def2e1ae6aa9a4c01fc1
SHA5129bdb6f68dc8982a8c0a007181c287c866a9b432a07b874c2fd0e8356b30505646f56d7bc8721ab64d32e5d3bd714c9a68a1aa60dee0af73d88aabf4c00c56cd6
-
Filesize
134KB
MD57f5cdf436d9c88aabdf278acf2789b5d
SHA1944dbc55835b6cfd5ea4f245d995faff2ce11b40
SHA2568c79836b0e0f4b810c9048258e15e3deb9258f6900b0def2e1ae6aa9a4c01fc1
SHA5129bdb6f68dc8982a8c0a007181c287c866a9b432a07b874c2fd0e8356b30505646f56d7bc8721ab64d32e5d3bd714c9a68a1aa60dee0af73d88aabf4c00c56cd6
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD5482e015725fdd3ed898640f7874bfd62
SHA1b0c010e35ff4340cf5ff0323b315fe1e07d2116b
SHA256c2f8cae5af64eb33c1ad5d19fc7818e563c0c7b0dfd1be563271e4eba29742a4
SHA5125811cab751bd2c5c0400bba50f3c23893f0554ece72f1a038ca221bd1b29c6e93edad7dcadbc5d77bf38bf380fff856c4451c0e2a9d1d801750133105c6bedc8
-
Filesize
134KB
MD584c567a05314172a6538600bbfc9de48
SHA1fa80a22324f609dc45f670fda587b20a11a6bf54
SHA25606c19827d266900848b40e41de096ff987bf5f1922760001f823acd4389cb911
SHA5123c34e280c51c065a4f38c09a7e7025aa17c69d02e4c6ccc85d5dd61f7321b53f6bd5c2a50ea80c88b629647c23e5a16cb0e65c5db27e7b83cf0d8147e7155fca
-
Filesize
134KB
MD584c567a05314172a6538600bbfc9de48
SHA1fa80a22324f609dc45f670fda587b20a11a6bf54
SHA25606c19827d266900848b40e41de096ff987bf5f1922760001f823acd4389cb911
SHA5123c34e280c51c065a4f38c09a7e7025aa17c69d02e4c6ccc85d5dd61f7321b53f6bd5c2a50ea80c88b629647c23e5a16cb0e65c5db27e7b83cf0d8147e7155fca
-
Filesize
134KB
MD57f5cdf436d9c88aabdf278acf2789b5d
SHA1944dbc55835b6cfd5ea4f245d995faff2ce11b40
SHA2568c79836b0e0f4b810c9048258e15e3deb9258f6900b0def2e1ae6aa9a4c01fc1
SHA5129bdb6f68dc8982a8c0a007181c287c866a9b432a07b874c2fd0e8356b30505646f56d7bc8721ab64d32e5d3bd714c9a68a1aa60dee0af73d88aabf4c00c56cd6
-
Filesize
134KB
MD57f5cdf436d9c88aabdf278acf2789b5d
SHA1944dbc55835b6cfd5ea4f245d995faff2ce11b40
SHA2568c79836b0e0f4b810c9048258e15e3deb9258f6900b0def2e1ae6aa9a4c01fc1
SHA5129bdb6f68dc8982a8c0a007181c287c866a9b432a07b874c2fd0e8356b30505646f56d7bc8721ab64d32e5d3bd714c9a68a1aa60dee0af73d88aabf4c00c56cd6