Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/11/2024, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe
Resource
win7-20240903-en
General
-
Target
db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe
-
Size
96KB
-
MD5
8c25e60ad60f4e68592180027bdac740
-
SHA1
9d6237c18d8fd7a8c1facb6f117f6bb72a9e4c81
-
SHA256
db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3ae
-
SHA512
986b3214767b9b0c7fcc7eb044fc5563ee9b54b29664a01b242ebdedecc10007d819c2e903cf55c4089cc79d7f43eb6685e101793142f04cfdf498f4c63701e0
-
SSDEEP
1536:anAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:aGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2004 omsecor.exe 1040 omsecor.exe 1252 omsecor.exe 772 omsecor.exe 1592 omsecor.exe 2596 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1996 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 1996 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 2004 omsecor.exe 1040 omsecor.exe 1040 omsecor.exe 772 omsecor.exe 772 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1392 set thread context of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 2004 set thread context of 1040 2004 omsecor.exe 33 PID 1252 set thread context of 772 1252 omsecor.exe 36 PID 1592 set thread context of 2596 1592 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 1392 wrote to memory of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 1392 wrote to memory of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 1392 wrote to memory of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 1392 wrote to memory of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 1392 wrote to memory of 1996 1392 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 31 PID 1996 wrote to memory of 2004 1996 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 32 PID 1996 wrote to memory of 2004 1996 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 32 PID 1996 wrote to memory of 2004 1996 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 32 PID 1996 wrote to memory of 2004 1996 db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe 32 PID 2004 wrote to memory of 1040 2004 omsecor.exe 33 PID 2004 wrote to memory of 1040 2004 omsecor.exe 33 PID 2004 wrote to memory of 1040 2004 omsecor.exe 33 PID 2004 wrote to memory of 1040 2004 omsecor.exe 33 PID 2004 wrote to memory of 1040 2004 omsecor.exe 33 PID 2004 wrote to memory of 1040 2004 omsecor.exe 33 PID 1040 wrote to memory of 1252 1040 omsecor.exe 35 PID 1040 wrote to memory of 1252 1040 omsecor.exe 35 PID 1040 wrote to memory of 1252 1040 omsecor.exe 35 PID 1040 wrote to memory of 1252 1040 omsecor.exe 35 PID 1252 wrote to memory of 772 1252 omsecor.exe 36 PID 1252 wrote to memory of 772 1252 omsecor.exe 36 PID 1252 wrote to memory of 772 1252 omsecor.exe 36 PID 1252 wrote to memory of 772 1252 omsecor.exe 36 PID 1252 wrote to memory of 772 1252 omsecor.exe 36 PID 1252 wrote to memory of 772 1252 omsecor.exe 36 PID 772 wrote to memory of 1592 772 omsecor.exe 37 PID 772 wrote to memory of 1592 772 omsecor.exe 37 PID 772 wrote to memory of 1592 772 omsecor.exe 37 PID 772 wrote to memory of 1592 772 omsecor.exe 37 PID 1592 wrote to memory of 2596 1592 omsecor.exe 38 PID 1592 wrote to memory of 2596 1592 omsecor.exe 38 PID 1592 wrote to memory of 2596 1592 omsecor.exe 38 PID 1592 wrote to memory of 2596 1592 omsecor.exe 38 PID 1592 wrote to memory of 2596 1592 omsecor.exe 38 PID 1592 wrote to memory of 2596 1592 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe"C:\Users\Admin\AppData\Local\Temp\db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exeC:\Users\Admin\AppData\Local\Temp\db7a84a0a9b75e881d6978b0280189748f4cfeb8329c12ac99b3b1885f72a3aeN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52c99838de1cdfdab4b747ed8e0fa0058
SHA13939a87c2ccdfc44ff9207304651abf08f1b100a
SHA256420ea6eed7d0e6e4497462329c35c76a3139573832a084e6af16b3aaac87e4d2
SHA5121a0156109217afefc6f54495891795d9905ea4e6ffbd32d62637b4a439c9736456b585a6bcf4d28e074b00190005d4b877ff5c28430d115fdc284089646d85c9
-
Filesize
96KB
MD566591657beefbb95ef871acb98839500
SHA112abdfa3861a5af9a6fb59dd4572eb1970788c0c
SHA25624f58b8b558448d546de8c84e450dcc0c360172e382c2480e951317794a0bc13
SHA5120f421b45d086db0aef8215cecbbc3c23aa3cdb59cdbec59eee688ae075a18ef628e5b20109a9728630fda408f6bb4efdf27d99276e34e5a8241ef25e2e6411ca
-
Filesize
96KB
MD5dc657ba46829a03f94d16cd90e876257
SHA1a12a2d513c7a5b04a67031e2f2ec5c67f38e814a
SHA2560d5a9c4a02617f9f7a98b2cc9720a3e015fdbafe7fa9d22d62be2ed95c0ead67
SHA512cd0f8d91de86929997a5b046a6019194f43139c193bfeb042d311e29e27bbaef13fdb9cccde55f4169c83acca0adbdcf2dfaad6d1fc10d15b9fb11ed64edb6fa