Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe
Resource
win7-20240903-en
General
-
Target
e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe
-
Size
96KB
-
MD5
2b32d2832eb8548a895dbc2601b8a466
-
SHA1
894ae484347b6df1d07e1c3811cde83308d08329
-
SHA256
e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3
-
SHA512
f64a78d79f22d9f0c1550363777084537275dd351f33d2c272791b8ac1a43e92c57fdb104fa8131d134fec4bf6bd14e8fcbc51dfe00c1a9ccdb3d45b71041bef
-
SSDEEP
1536:0nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:0Gs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2264 omsecor.exe 2404 omsecor.exe 2876 omsecor.exe 2584 omsecor.exe 2036 omsecor.exe 1764 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1992 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 1992 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 2264 omsecor.exe 2404 omsecor.exe 2404 omsecor.exe 2584 omsecor.exe 2584 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2156 set thread context of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 2264 set thread context of 2404 2264 omsecor.exe 32 PID 2876 set thread context of 2584 2876 omsecor.exe 36 PID 2036 set thread context of 1764 2036 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 2156 wrote to memory of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 2156 wrote to memory of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 2156 wrote to memory of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 2156 wrote to memory of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 2156 wrote to memory of 1992 2156 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 30 PID 1992 wrote to memory of 2264 1992 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 31 PID 1992 wrote to memory of 2264 1992 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 31 PID 1992 wrote to memory of 2264 1992 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 31 PID 1992 wrote to memory of 2264 1992 e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe 31 PID 2264 wrote to memory of 2404 2264 omsecor.exe 32 PID 2264 wrote to memory of 2404 2264 omsecor.exe 32 PID 2264 wrote to memory of 2404 2264 omsecor.exe 32 PID 2264 wrote to memory of 2404 2264 omsecor.exe 32 PID 2264 wrote to memory of 2404 2264 omsecor.exe 32 PID 2264 wrote to memory of 2404 2264 omsecor.exe 32 PID 2404 wrote to memory of 2876 2404 omsecor.exe 35 PID 2404 wrote to memory of 2876 2404 omsecor.exe 35 PID 2404 wrote to memory of 2876 2404 omsecor.exe 35 PID 2404 wrote to memory of 2876 2404 omsecor.exe 35 PID 2876 wrote to memory of 2584 2876 omsecor.exe 36 PID 2876 wrote to memory of 2584 2876 omsecor.exe 36 PID 2876 wrote to memory of 2584 2876 omsecor.exe 36 PID 2876 wrote to memory of 2584 2876 omsecor.exe 36 PID 2876 wrote to memory of 2584 2876 omsecor.exe 36 PID 2876 wrote to memory of 2584 2876 omsecor.exe 36 PID 2584 wrote to memory of 2036 2584 omsecor.exe 37 PID 2584 wrote to memory of 2036 2584 omsecor.exe 37 PID 2584 wrote to memory of 2036 2584 omsecor.exe 37 PID 2584 wrote to memory of 2036 2584 omsecor.exe 37 PID 2036 wrote to memory of 1764 2036 omsecor.exe 38 PID 2036 wrote to memory of 1764 2036 omsecor.exe 38 PID 2036 wrote to memory of 1764 2036 omsecor.exe 38 PID 2036 wrote to memory of 1764 2036 omsecor.exe 38 PID 2036 wrote to memory of 1764 2036 omsecor.exe 38 PID 2036 wrote to memory of 1764 2036 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe"C:\Users\Admin\AppData\Local\Temp\e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exeC:\Users\Admin\AppData\Local\Temp\e38d5be26e5e28d04d78b42898a881c2c38c7c3d3364a9bc0214ab62f6e0e8f3.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1764
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d48ed081dee2cb716a1daf825a1f6dd8
SHA18eedb531d719d8fb54478d7692b1fd707fe34074
SHA256ce1052dbd9a40d7a4011189b9a8a4aa7c98fdefa587c2177f80ad865318778c9
SHA512d40fbba8695e97f583ac6f3a4be991029d8c529cd24c8852504f315c6f2b78fd6a03bd7cb8bf895a997d2aa1e801d4d3e32827df7bc00d78d434f2671d1ad58b
-
Filesize
96KB
MD52c5fb50480c99d74c733a81b0eb938f0
SHA19cde90563a960086839618474dac7d2676d3865e
SHA2561985c279e9fe276523b149c7372adecd0964ad9b4659d0ea6797161d0187a07b
SHA512c4b1734d6b070c162fb8076e3767283eae3f096d5eeb91ef6a3030947e62a9e7c1f6a18327b00b6c9ed703f4a55e7bff2e899282aa4adf2c5c2df157160288fa
-
Filesize
96KB
MD564c431140e57beb1136377f45f844d32
SHA1a6069ad5f3e8b44ad2340df0480be00680c1b254
SHA256928fcbec57ba02c22d19b4eaae545cb58b509c46ebc893b463ff30b6247fac2b
SHA512655fa8291dade8fdfa86509e5006c690bc5bb7ef599619a106b375bd42429bfd2d5eca48e7da98928e80beafb225fedd1dfcf7887c6802ae5d68b4ed1ae8e90d