Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe
Resource
win7-20240903-en
General
-
Target
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe
-
Size
96KB
-
MD5
389707e51deb56cbc4a8fb521353819d
-
SHA1
16171e9390aaa1d836978f278134b4cf85719e00
-
SHA256
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add
-
SHA512
d9a2c9ad36169a682b936a54dde29188e7b39b50790aa9d2184cc6853d2ba5bb9c633c8403359b648f853ab3a5bcc88087e11c0120dfce4703628db1b7c158e3
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:TGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 2 IoCs
pid Process 2088 omsecor.exe 2552 omsecor.exe -
Loads dropped DLL 3 IoCs
pid Process 2692 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 2692 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 2088 omsecor.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2056 set thread context of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2088 set thread context of 2552 2088 omsecor.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2056 wrote to memory of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2056 wrote to memory of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2056 wrote to memory of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2056 wrote to memory of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2056 wrote to memory of 2692 2056 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2692 wrote to memory of 2088 2692 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2692 wrote to memory of 2088 2692 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2692 wrote to memory of 2088 2692 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2692 wrote to memory of 2088 2692 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2088 wrote to memory of 2552 2088 omsecor.exe 32 PID 2088 wrote to memory of 2552 2088 omsecor.exe 32 PID 2088 wrote to memory of 2552 2088 omsecor.exe 32 PID 2088 wrote to memory of 2552 2088 omsecor.exe 32 PID 2088 wrote to memory of 2552 2088 omsecor.exe 32 PID 2088 wrote to memory of 2552 2088 omsecor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe"C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exeC:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f379d54c8fec3f2076e5ee555e64d09
SHA17de44d8ef0a29a281ada5219d10b665eb45f5375
SHA256f29389caf2ee469d5c720f5db19dcfe89d6bed4627062e525c285f7ce0292ebd
SHA5121d8afd76beba4fc426cb9aa524aeb3a9d8ef303774f69ad217146e1603a345942f64a3ac457d2ed77e4d1365d41c98f9e3e15daabe9a33087ccc4171cdab1e4e