Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe
Resource
win7-20240903-en
General
-
Target
794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe
-
Size
96KB
-
MD5
0249e3dd89f68358a93601b139fab1ce
-
SHA1
cd2de26853cbb87cad8f4d72233e9e86af263d13
-
SHA256
794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89
-
SHA512
8f2bae5839a88239a82e879c1319a5d6abf3bbb4222c7d6e05fb64a138c5236ced543c2d484109213571ace023acf7a781679c0ce70f111f40cd791dd1a11833
-
SSDEEP
1536:YnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:YGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2212 omsecor.exe 2628 omsecor.exe 848 omsecor.exe 2612 omsecor.exe 1476 omsecor.exe 2288 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2308 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 2308 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 2212 omsecor.exe 2628 omsecor.exe 2628 omsecor.exe 2612 omsecor.exe 2612 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2060 set thread context of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2212 set thread context of 2628 2212 omsecor.exe 33 PID 848 set thread context of 2612 848 omsecor.exe 37 PID 1476 set thread context of 2288 1476 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2060 wrote to memory of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2060 wrote to memory of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2060 wrote to memory of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2060 wrote to memory of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2060 wrote to memory of 2308 2060 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 31 PID 2308 wrote to memory of 2212 2308 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 32 PID 2308 wrote to memory of 2212 2308 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 32 PID 2308 wrote to memory of 2212 2308 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 32 PID 2308 wrote to memory of 2212 2308 794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe 32 PID 2212 wrote to memory of 2628 2212 omsecor.exe 33 PID 2212 wrote to memory of 2628 2212 omsecor.exe 33 PID 2212 wrote to memory of 2628 2212 omsecor.exe 33 PID 2212 wrote to memory of 2628 2212 omsecor.exe 33 PID 2212 wrote to memory of 2628 2212 omsecor.exe 33 PID 2212 wrote to memory of 2628 2212 omsecor.exe 33 PID 2628 wrote to memory of 848 2628 omsecor.exe 36 PID 2628 wrote to memory of 848 2628 omsecor.exe 36 PID 2628 wrote to memory of 848 2628 omsecor.exe 36 PID 2628 wrote to memory of 848 2628 omsecor.exe 36 PID 848 wrote to memory of 2612 848 omsecor.exe 37 PID 848 wrote to memory of 2612 848 omsecor.exe 37 PID 848 wrote to memory of 2612 848 omsecor.exe 37 PID 848 wrote to memory of 2612 848 omsecor.exe 37 PID 848 wrote to memory of 2612 848 omsecor.exe 37 PID 848 wrote to memory of 2612 848 omsecor.exe 37 PID 2612 wrote to memory of 1476 2612 omsecor.exe 38 PID 2612 wrote to memory of 1476 2612 omsecor.exe 38 PID 2612 wrote to memory of 1476 2612 omsecor.exe 38 PID 2612 wrote to memory of 1476 2612 omsecor.exe 38 PID 1476 wrote to memory of 2288 1476 omsecor.exe 39 PID 1476 wrote to memory of 2288 1476 omsecor.exe 39 PID 1476 wrote to memory of 2288 1476 omsecor.exe 39 PID 1476 wrote to memory of 2288 1476 omsecor.exe 39 PID 1476 wrote to memory of 2288 1476 omsecor.exe 39 PID 1476 wrote to memory of 2288 1476 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe"C:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exeC:\Users\Admin\AppData\Local\Temp\794cc23ebc508c2ec67c36a442cdfcb4ebe72f088518511357676accf67ffb89.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c87554b4d16b4d9c6b7e9cc99a82290d
SHA116d875aba79925654781c57c77c439a31b3962d0
SHA256fb0af20192bd74ce698078ec23ef8c0ea98b72c569ca7d23f4604ded45b3c6ad
SHA512c66900a276537958cd5d1c8becd098be0b350538271e89a02815b8722bd6694ae3610ae7e322e399cdefec2f9d5a05a8bbe9906c06cffcce1a3f93efa30accb7
-
Filesize
96KB
MD511013561effc70977d4d942b56d13711
SHA1163c8a822cddf2174bb9fd682e020d9ea054dbb4
SHA256f1bdf162e73c27b265f26524aac2e5353c4342765337e19daa89e1984f6e07b8
SHA5125c14d6a115ca8abe7814f07ccb8cef224e0dd40f8dd7f0e333ef73ee2678d487d1e8d1e4a84aced62103790a254918ef5a723abbc06445aa3adeebe3d1c1a357
-
Filesize
96KB
MD5b89265c722ccc67f27db95a6bfbaafe9
SHA1d4e4ded82cd3848545c1895165b25441184968a7
SHA256114f7f1bd3c8ad926170a66b8298bf46005c8b95915cdee71dfbe926b9dcd79a
SHA512d15425d5af9ca89a690527ebb4d8be45774403c54a9e947aec51dd34e98f2537d5e6be0b53fae098d934aae8a260fca39eb496defd4c03574dac486353ae2ffc