Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe
Resource
win7-20240903-en
General
-
Target
da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe
-
Size
134KB
-
MD5
8d1f38c9f1405352a2dcceff061f1483
-
SHA1
9dc92890740b026fb64c497d5d8586480395d26a
-
SHA256
da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830
-
SHA512
18af5e875f81d07177ca65312749b7b741b6831478f369c5451fd3ceb938f7d4ce36450d28bd0ed5566d0be17a272c1856be1f3285c794689058305200500b13
-
SSDEEP
1536:jDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCil:viRTeH0iqAW6J6f1tqF6dngNmaZCiaC
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2356 omsecor.exe 1932 omsecor.exe 2624 omsecor.exe 2860 omsecor.exe 1228 omsecor.exe 2904 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2300 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 2300 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 2356 omsecor.exe 1932 omsecor.exe 1932 omsecor.exe 2860 omsecor.exe 2860 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1668 set thread context of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 2356 set thread context of 1932 2356 omsecor.exe 33 PID 2624 set thread context of 2860 2624 omsecor.exe 36 PID 1228 set thread context of 2904 1228 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 1668 wrote to memory of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 1668 wrote to memory of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 1668 wrote to memory of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 1668 wrote to memory of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 1668 wrote to memory of 2300 1668 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 31 PID 2300 wrote to memory of 2356 2300 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 32 PID 2300 wrote to memory of 2356 2300 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 32 PID 2300 wrote to memory of 2356 2300 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 32 PID 2300 wrote to memory of 2356 2300 da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe 32 PID 2356 wrote to memory of 1932 2356 omsecor.exe 33 PID 2356 wrote to memory of 1932 2356 omsecor.exe 33 PID 2356 wrote to memory of 1932 2356 omsecor.exe 33 PID 2356 wrote to memory of 1932 2356 omsecor.exe 33 PID 2356 wrote to memory of 1932 2356 omsecor.exe 33 PID 2356 wrote to memory of 1932 2356 omsecor.exe 33 PID 1932 wrote to memory of 2624 1932 omsecor.exe 35 PID 1932 wrote to memory of 2624 1932 omsecor.exe 35 PID 1932 wrote to memory of 2624 1932 omsecor.exe 35 PID 1932 wrote to memory of 2624 1932 omsecor.exe 35 PID 2624 wrote to memory of 2860 2624 omsecor.exe 36 PID 2624 wrote to memory of 2860 2624 omsecor.exe 36 PID 2624 wrote to memory of 2860 2624 omsecor.exe 36 PID 2624 wrote to memory of 2860 2624 omsecor.exe 36 PID 2624 wrote to memory of 2860 2624 omsecor.exe 36 PID 2624 wrote to memory of 2860 2624 omsecor.exe 36 PID 2860 wrote to memory of 1228 2860 omsecor.exe 37 PID 2860 wrote to memory of 1228 2860 omsecor.exe 37 PID 2860 wrote to memory of 1228 2860 omsecor.exe 37 PID 2860 wrote to memory of 1228 2860 omsecor.exe 37 PID 1228 wrote to memory of 2904 1228 omsecor.exe 38 PID 1228 wrote to memory of 2904 1228 omsecor.exe 38 PID 1228 wrote to memory of 2904 1228 omsecor.exe 38 PID 1228 wrote to memory of 2904 1228 omsecor.exe 38 PID 1228 wrote to memory of 2904 1228 omsecor.exe 38 PID 1228 wrote to memory of 2904 1228 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe"C:\Users\Admin\AppData\Local\Temp\da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exeC:\Users\Admin\AppData\Local\Temp\da89d114cdce5c625c9dfe5b397b70cf7b129febb0f58b49685a4fed6da33830.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD535c47ebbe031782334c4a74af139fcd6
SHA1857c2f05225116ce0b66feebb848cf6eac6d59c0
SHA2564858b4a85e310d0cea7e1a511e15e54c2ce6e2ab84dbd07af656d040e346c4cf
SHA5129902cdb4537dd96444098f3288bce4ca45aae19667ff3890d2c62e48591acd161db834be84b955e3ca5462731fb17cef1ce6f6fbe64718a10805e416eb589cbb
-
Filesize
134KB
MD58b572458bf6e07d0898e3b76277f188e
SHA18bee4cb6e01721ff5f4a12db54cd9602a97da245
SHA256f28b90a2b250f7409245f52c52eaedcf82beaa423b3f641d125ba178fe8b99b2
SHA512c06638d14add2ec1ffde30a8bc8d073d648c02887a05aefa4cf3706e5f4a1ce49acff6da794eeddaa7a04d69c5e56a8fb8d4e30ee8a5c02dea22f5faa9160b77
-
Filesize
134KB
MD540d7ceb2362a253ea831683de5de0d3f
SHA1b2376982efc2d42bea889b3e419be8643d55bbc3
SHA2569656d0227a74d655fc77e883534220dfef0b7f1c37718eca943be1cad408d01b
SHA51213629fc6caca1a7ab6315f92f3af91554d4194b2af28e5b3ffc9c22a77149319ef818a6d8fa4c59fa0c7f318774d0387cde57e5d3adccddc6984a89a42700355