Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe
Resource
win7-20240903-en
General
-
Target
29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe
-
Size
96KB
-
MD5
686314d255c8dc7433a5589a68e2118f
-
SHA1
3bd6ad33bb317458e972e942e122a534b5dc2f8f
-
SHA256
29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc
-
SHA512
99a26a74d6e01acc6693298e1241ec5681bfb4b24797e76202bcac7db757f7e741b1bf4344aa7a75c9944d52d251db8e72c11711769e75f0035f6cc8ae36da48
-
SSDEEP
1536:0nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:0Gs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1268 omsecor.exe 2024 omsecor.exe 1152 omsecor.exe 2800 omsecor.exe 1840 omsecor.exe 2964 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1156 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 1156 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 1268 omsecor.exe 2024 omsecor.exe 2024 omsecor.exe 2800 omsecor.exe 2800 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2336 set thread context of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 1268 set thread context of 2024 1268 omsecor.exe 32 PID 1152 set thread context of 2800 1152 omsecor.exe 36 PID 1840 set thread context of 2964 1840 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 2336 wrote to memory of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 2336 wrote to memory of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 2336 wrote to memory of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 2336 wrote to memory of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 2336 wrote to memory of 1156 2336 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 30 PID 1156 wrote to memory of 1268 1156 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 31 PID 1156 wrote to memory of 1268 1156 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 31 PID 1156 wrote to memory of 1268 1156 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 31 PID 1156 wrote to memory of 1268 1156 29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe 31 PID 1268 wrote to memory of 2024 1268 omsecor.exe 32 PID 1268 wrote to memory of 2024 1268 omsecor.exe 32 PID 1268 wrote to memory of 2024 1268 omsecor.exe 32 PID 1268 wrote to memory of 2024 1268 omsecor.exe 32 PID 1268 wrote to memory of 2024 1268 omsecor.exe 32 PID 1268 wrote to memory of 2024 1268 omsecor.exe 32 PID 2024 wrote to memory of 1152 2024 omsecor.exe 35 PID 2024 wrote to memory of 1152 2024 omsecor.exe 35 PID 2024 wrote to memory of 1152 2024 omsecor.exe 35 PID 2024 wrote to memory of 1152 2024 omsecor.exe 35 PID 1152 wrote to memory of 2800 1152 omsecor.exe 36 PID 1152 wrote to memory of 2800 1152 omsecor.exe 36 PID 1152 wrote to memory of 2800 1152 omsecor.exe 36 PID 1152 wrote to memory of 2800 1152 omsecor.exe 36 PID 1152 wrote to memory of 2800 1152 omsecor.exe 36 PID 1152 wrote to memory of 2800 1152 omsecor.exe 36 PID 2800 wrote to memory of 1840 2800 omsecor.exe 37 PID 2800 wrote to memory of 1840 2800 omsecor.exe 37 PID 2800 wrote to memory of 1840 2800 omsecor.exe 37 PID 2800 wrote to memory of 1840 2800 omsecor.exe 37 PID 1840 wrote to memory of 2964 1840 omsecor.exe 38 PID 1840 wrote to memory of 2964 1840 omsecor.exe 38 PID 1840 wrote to memory of 2964 1840 omsecor.exe 38 PID 1840 wrote to memory of 2964 1840 omsecor.exe 38 PID 1840 wrote to memory of 2964 1840 omsecor.exe 38 PID 1840 wrote to memory of 2964 1840 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe"C:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exeC:\Users\Admin\AppData\Local\Temp\29cd64a5caea5ff774591db67870db2ad216f1ffd84e438d571d4b744f4c67fc.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD529b1b355833da1b72a5b3feed6b5e592
SHA1e17a9b47aa5f75964084cd12a014779c141c8e28
SHA25602adf171a2181bcfbc1c428b3e30c76df58bcc6aa674348236bd2f3408a07d25
SHA51280071b57966561419d8ec9091d0eb44a4cd5f811796a274944c0f0580731f1523d1d2e2602b8522d30f3c10bd16e8852e3c3016821eae8da58f1b2b47f1ec3e0
-
Filesize
96KB
MD510c1d9395b24bac0a5a08bacee84ef1a
SHA1d3617fea8eff52c3e1d335e2b5c5e0a311eff6a0
SHA256c1c5b995f0bdc2690aa9f394849334c228108873aeac950871a33dd9b8752d77
SHA51290216088dfb27de412def08ede1715d8a70c6f2cc9b09b22724a443b0a01bdca64a93827a3830889980f113b9db0ae24b1f0534011057ee0c45830781dbde109
-
Filesize
96KB
MD53d03b896f0b8c1b7d2835a59db920a66
SHA16e4cd1c2b2dba6a03fa91444c3a970e95245c6a7
SHA256ac37e7bcfa32b7eaee87d1595459e77c60da6ca86b67ce9a793b37886c03edf4
SHA512e6054c6b25e1efb21f97339e0f978a6605d3275687fd90275b36d19e1d701674909e288e8f03b37e1853498bdf8cabad450992477b882208a62e03483ee5948d