Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe
Resource
win7-20241010-en
General
-
Target
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe
-
Size
96KB
-
MD5
389707e51deb56cbc4a8fb521353819d
-
SHA1
16171e9390aaa1d836978f278134b4cf85719e00
-
SHA256
505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add
-
SHA512
d9a2c9ad36169a682b936a54dde29188e7b39b50790aa9d2184cc6853d2ba5bb9c633c8403359b648f853ab3a5bcc88087e11c0120dfce4703628db1b7c158e3
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:TGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2852 omsecor.exe 2828 omsecor.exe 2876 omsecor.exe 2924 omsecor.exe 2212 omsecor.exe 2132 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2324 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 2324 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 2852 omsecor.exe 2828 omsecor.exe 2828 omsecor.exe 2924 omsecor.exe 2924 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2944 set thread context of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2852 set thread context of 2828 2852 omsecor.exe 32 PID 2876 set thread context of 2924 2876 omsecor.exe 36 PID 2212 set thread context of 2132 2212 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2944 wrote to memory of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2944 wrote to memory of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2944 wrote to memory of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2944 wrote to memory of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2944 wrote to memory of 2324 2944 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 30 PID 2324 wrote to memory of 2852 2324 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2324 wrote to memory of 2852 2324 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2324 wrote to memory of 2852 2324 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2324 wrote to memory of 2852 2324 505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe 31 PID 2852 wrote to memory of 2828 2852 omsecor.exe 32 PID 2852 wrote to memory of 2828 2852 omsecor.exe 32 PID 2852 wrote to memory of 2828 2852 omsecor.exe 32 PID 2852 wrote to memory of 2828 2852 omsecor.exe 32 PID 2852 wrote to memory of 2828 2852 omsecor.exe 32 PID 2852 wrote to memory of 2828 2852 omsecor.exe 32 PID 2828 wrote to memory of 2876 2828 omsecor.exe 35 PID 2828 wrote to memory of 2876 2828 omsecor.exe 35 PID 2828 wrote to memory of 2876 2828 omsecor.exe 35 PID 2828 wrote to memory of 2876 2828 omsecor.exe 35 PID 2876 wrote to memory of 2924 2876 omsecor.exe 36 PID 2876 wrote to memory of 2924 2876 omsecor.exe 36 PID 2876 wrote to memory of 2924 2876 omsecor.exe 36 PID 2876 wrote to memory of 2924 2876 omsecor.exe 36 PID 2876 wrote to memory of 2924 2876 omsecor.exe 36 PID 2876 wrote to memory of 2924 2876 omsecor.exe 36 PID 2924 wrote to memory of 2212 2924 omsecor.exe 37 PID 2924 wrote to memory of 2212 2924 omsecor.exe 37 PID 2924 wrote to memory of 2212 2924 omsecor.exe 37 PID 2924 wrote to memory of 2212 2924 omsecor.exe 37 PID 2212 wrote to memory of 2132 2212 omsecor.exe 38 PID 2212 wrote to memory of 2132 2212 omsecor.exe 38 PID 2212 wrote to memory of 2132 2212 omsecor.exe 38 PID 2212 wrote to memory of 2132 2212 omsecor.exe 38 PID 2212 wrote to memory of 2132 2212 omsecor.exe 38 PID 2212 wrote to memory of 2132 2212 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe"C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exeC:\Users\Admin\AppData\Local\Temp\505531ee47b179d4770c0932475627bf21231952b7425d5f3a413031acef7add.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55f379d54c8fec3f2076e5ee555e64d09
SHA17de44d8ef0a29a281ada5219d10b665eb45f5375
SHA256f29389caf2ee469d5c720f5db19dcfe89d6bed4627062e525c285f7ce0292ebd
SHA5121d8afd76beba4fc426cb9aa524aeb3a9d8ef303774f69ad217146e1603a345942f64a3ac457d2ed77e4d1365d41c98f9e3e15daabe9a33087ccc4171cdab1e4e
-
Filesize
96KB
MD566361352505adbb64e4af272cbbcdfb0
SHA1ec67fe8d1e277fe42c951f67062f4b9ad97f4c8b
SHA2561aa7017c02b3b830596dde3430747597356eaa4f21966b0d14558f90c9211127
SHA512ad8a1c4dae1d7b277fc0f405bfc4aeda642fa143c8caf75a2ab696294697fb310374a188f9e973be885bf71cff02516b07022ac6c1080e65e94e4744a01e58cb
-
Filesize
96KB
MD5dd7c6286918ce84d4fce99937652029d
SHA1feb95ecbce296a5b73f528c699be18719cce6a49
SHA256d7cb9a99c1209eb79955c32e44310d90e48c9b50187d7f1ed3320873cd7900e2
SHA512cb7237624bba5b83e2feb24cb021279ac7b1f1f5006362b0c7420331a8e46a4b86cc2c7973a6b5055e902496735218f709f49f80f1613dd56c1f9020d83336d7