Analysis
-
max time kernel
116s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe
Resource
win7-20241010-en
General
-
Target
b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe
-
Size
96KB
-
MD5
c2cab31a81e910d235fa246b3986a3e0
-
SHA1
c6e907beb0b2720a16b5dedac994af35231b1964
-
SHA256
b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947
-
SHA512
b5dcac08a6e8cc050916b6fc01cbe6d8e681a8c9aec61df045064ee263780f412df348441d21282b2acb1dda465335d97b2a3191fcebbbfabae909b82e76d003
-
SSDEEP
1536:YnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:YGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2720 omsecor.exe 2744 omsecor.exe 2220 omsecor.exe 1688 omsecor.exe 548 omsecor.exe 2192 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2772 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 2772 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 2720 omsecor.exe 2744 omsecor.exe 2744 omsecor.exe 1688 omsecor.exe 1688 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2536 set thread context of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2720 set thread context of 2744 2720 omsecor.exe 32 PID 2220 set thread context of 1688 2220 omsecor.exe 35 PID 548 set thread context of 2192 548 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2536 wrote to memory of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2536 wrote to memory of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2536 wrote to memory of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2536 wrote to memory of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2536 wrote to memory of 2772 2536 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 30 PID 2772 wrote to memory of 2720 2772 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 31 PID 2772 wrote to memory of 2720 2772 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 31 PID 2772 wrote to memory of 2720 2772 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 31 PID 2772 wrote to memory of 2720 2772 b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe 31 PID 2720 wrote to memory of 2744 2720 omsecor.exe 32 PID 2720 wrote to memory of 2744 2720 omsecor.exe 32 PID 2720 wrote to memory of 2744 2720 omsecor.exe 32 PID 2720 wrote to memory of 2744 2720 omsecor.exe 32 PID 2720 wrote to memory of 2744 2720 omsecor.exe 32 PID 2720 wrote to memory of 2744 2720 omsecor.exe 32 PID 2744 wrote to memory of 2220 2744 omsecor.exe 34 PID 2744 wrote to memory of 2220 2744 omsecor.exe 34 PID 2744 wrote to memory of 2220 2744 omsecor.exe 34 PID 2744 wrote to memory of 2220 2744 omsecor.exe 34 PID 2220 wrote to memory of 1688 2220 omsecor.exe 35 PID 2220 wrote to memory of 1688 2220 omsecor.exe 35 PID 2220 wrote to memory of 1688 2220 omsecor.exe 35 PID 2220 wrote to memory of 1688 2220 omsecor.exe 35 PID 2220 wrote to memory of 1688 2220 omsecor.exe 35 PID 2220 wrote to memory of 1688 2220 omsecor.exe 35 PID 1688 wrote to memory of 548 1688 omsecor.exe 36 PID 1688 wrote to memory of 548 1688 omsecor.exe 36 PID 1688 wrote to memory of 548 1688 omsecor.exe 36 PID 1688 wrote to memory of 548 1688 omsecor.exe 36 PID 548 wrote to memory of 2192 548 omsecor.exe 37 PID 548 wrote to memory of 2192 548 omsecor.exe 37 PID 548 wrote to memory of 2192 548 omsecor.exe 37 PID 548 wrote to memory of 2192 548 omsecor.exe 37 PID 548 wrote to memory of 2192 548 omsecor.exe 37 PID 548 wrote to memory of 2192 548 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe"C:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exeC:\Users\Admin\AppData\Local\Temp\b3622fea29fec6888b0d3dc04c4f788ed8f9cceef1029a8e8378f412b76f0947N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD538fd507f2f0e1f992df19494b466d02f
SHA1386b7f5f3343daa78a09206f251548770d512add
SHA2563cf1d47c53353f2707a5ffe0173d31025f4155aca5bf3a213e147ca49c175b8b
SHA51279298a0824895149945220c1032e36e3a84a39d74cc6b1dbd5dd6da89c515746686a38cb2d1d8a6c54575b3ab26d30f6a005bc0f9d6b322423515dc7ed552d97
-
Filesize
96KB
MD5c919bad7f693de3718c786b6b9332c11
SHA1106892c4e8dc0f87a44cf73c6f81d37954b2733a
SHA25631f9706b414867baf52e34de38bbdde5e4e2437f84b38db11a228f184fe87808
SHA512523b7758e0ca8a904a718a22e002db0be7012d0a0cacf9dea64f07ef16125da91c400d8a24f013855b4bd1c9ff74e07dd93eb03b10d3dd115558718b42d151f4
-
Filesize
96KB
MD5269785c0ed4c229ec531e36f0bf89dea
SHA1d4d34152eb45c5686d5f8e96e74481444a3af05e
SHA25676981cbd7154502a4453c6c975de56670758e078f3b5a6dc8f50e5e80a427d76
SHA512df1c36fc2e4d0e0c949e27782563a9e90555f753d736454b06e58eeb6f9a23fb7a9d24bbe3c8220b84cd36d221d277827e2f206219d1c6f32ecd69ca64c5185b