Analysis
-
max time kernel
116s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe
Resource
win7-20241010-en
General
-
Target
2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe
-
Size
96KB
-
MD5
aadaeb52e55be32cc0d7a72b08e5f9a0
-
SHA1
664ddf69e254972d8c08b050eff65342c470b346
-
SHA256
2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74
-
SHA512
25f5d99ca6e77f6d6712f90b6922238673cf4a62f0917057691a0021cec356becf2a302542f50a768ea4e61a652d0c94ebf3dff6c77580d69d8c4bae49a59fbb
-
SSDEEP
1536:0nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:0Gs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1700 omsecor.exe 2432 omsecor.exe 1980 omsecor.exe 1928 omsecor.exe 1892 omsecor.exe 3004 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2304 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 2304 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 1700 omsecor.exe 2432 omsecor.exe 2432 omsecor.exe 1928 omsecor.exe 1928 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2260 set thread context of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 1700 set thread context of 2432 1700 omsecor.exe 33 PID 1980 set thread context of 1928 1980 omsecor.exe 36 PID 1892 set thread context of 3004 1892 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 2260 wrote to memory of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 2260 wrote to memory of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 2260 wrote to memory of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 2260 wrote to memory of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 2260 wrote to memory of 2304 2260 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 31 PID 2304 wrote to memory of 1700 2304 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 32 PID 2304 wrote to memory of 1700 2304 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 32 PID 2304 wrote to memory of 1700 2304 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 32 PID 2304 wrote to memory of 1700 2304 2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe 32 PID 1700 wrote to memory of 2432 1700 omsecor.exe 33 PID 1700 wrote to memory of 2432 1700 omsecor.exe 33 PID 1700 wrote to memory of 2432 1700 omsecor.exe 33 PID 1700 wrote to memory of 2432 1700 omsecor.exe 33 PID 1700 wrote to memory of 2432 1700 omsecor.exe 33 PID 1700 wrote to memory of 2432 1700 omsecor.exe 33 PID 2432 wrote to memory of 1980 2432 omsecor.exe 35 PID 2432 wrote to memory of 1980 2432 omsecor.exe 35 PID 2432 wrote to memory of 1980 2432 omsecor.exe 35 PID 2432 wrote to memory of 1980 2432 omsecor.exe 35 PID 1980 wrote to memory of 1928 1980 omsecor.exe 36 PID 1980 wrote to memory of 1928 1980 omsecor.exe 36 PID 1980 wrote to memory of 1928 1980 omsecor.exe 36 PID 1980 wrote to memory of 1928 1980 omsecor.exe 36 PID 1980 wrote to memory of 1928 1980 omsecor.exe 36 PID 1980 wrote to memory of 1928 1980 omsecor.exe 36 PID 1928 wrote to memory of 1892 1928 omsecor.exe 37 PID 1928 wrote to memory of 1892 1928 omsecor.exe 37 PID 1928 wrote to memory of 1892 1928 omsecor.exe 37 PID 1928 wrote to memory of 1892 1928 omsecor.exe 37 PID 1892 wrote to memory of 3004 1892 omsecor.exe 38 PID 1892 wrote to memory of 3004 1892 omsecor.exe 38 PID 1892 wrote to memory of 3004 1892 omsecor.exe 38 PID 1892 wrote to memory of 3004 1892 omsecor.exe 38 PID 1892 wrote to memory of 3004 1892 omsecor.exe 38 PID 1892 wrote to memory of 3004 1892 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe"C:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exeC:\Users\Admin\AppData\Local\Temp\2626b9f67620618d0bdbc8aeee36cfd63237625f56f7d5e7ae42af69ddef0c74N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD526c2738c2dbedd1c812ca720c6997ff9
SHA12241751435a939d4252892847335a144defd71b2
SHA2564cd9026718afc5b60a89163e71cfeb2cf678a8abdd8d9e5dc9ee38343ae8828f
SHA512d801338707719c4dc03be226b160deaf1f766477fdcb3f72f3bb4ae4a113dc8570e84ba54dd89931810ff1d538ed49a4e48eb3d91c4a008895c62ad12b74db5f
-
Filesize
96KB
MD5ebbf25f07da44c6ef69fc7a26f75200b
SHA1ef08630f0d78602af7e0a4577124bf82ee781955
SHA256daabff68d1c0fe60dbf96301d3ec6a352589eaa4eec2dbd81c8613a59feb4629
SHA5123d28baf97df164af5a8da86eab5febdf56082fa18441e4b74b35a060283fe8f429b239bcda87cc608778e8fa8423957bcdfd5d0fd96acd0a5313c1fa889e2207
-
Filesize
96KB
MD55561334c1c241008040521e295c034a6
SHA1dcef8649f7e493e54f2c4486ff6c516c81e82ec6
SHA2561463ce9fe456067510fb56c7f84a47b9cb58d9ba42adba3ed56166a90b953d4a
SHA5123ff369e20fca6613371d75ae08e583115aec14f72f2a25a35251a6e374691d401f6f774c4063b05f4e97841179eb69906b38131c43fb65f45a88ec95a9c185df