Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/11/2024, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
Resource
win7-20240708-en
General
-
Target
2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe
-
Size
96KB
-
MD5
413943c6ee13467286abb93e4f8959ff
-
SHA1
5e6200d33110cfb5f18b7ac232dfc05c5b09b61f
-
SHA256
2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d
-
SHA512
885e2779c74cd0b6ee8b4731d215301e8f174f9e0f29cdddb19ace8d580c1cfec4252f807b2278972ea0c54ee41ac86c920865d30a825d39499d72be8edd3210
-
SSDEEP
1536:wnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx5:wGs8cd8eXlYairZYqMddH135
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2392 omsecor.exe 2260 omsecor.exe 1776 omsecor.exe 2384 omsecor.exe 2036 omsecor.exe 1908 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 824 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 824 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 2392 omsecor.exe 2260 omsecor.exe 2260 omsecor.exe 2384 omsecor.exe 2384 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2292 set thread context of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 2392 set thread context of 2260 2392 omsecor.exe 30 PID 1776 set thread context of 2384 1776 omsecor.exe 35 PID 2036 set thread context of 1908 2036 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2292 wrote to memory of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 2292 wrote to memory of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 2292 wrote to memory of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 2292 wrote to memory of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 2292 wrote to memory of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 2292 wrote to memory of 824 2292 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 28 PID 824 wrote to memory of 2392 824 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 29 PID 824 wrote to memory of 2392 824 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 29 PID 824 wrote to memory of 2392 824 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 29 PID 824 wrote to memory of 2392 824 2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe 29 PID 2392 wrote to memory of 2260 2392 omsecor.exe 30 PID 2392 wrote to memory of 2260 2392 omsecor.exe 30 PID 2392 wrote to memory of 2260 2392 omsecor.exe 30 PID 2392 wrote to memory of 2260 2392 omsecor.exe 30 PID 2392 wrote to memory of 2260 2392 omsecor.exe 30 PID 2392 wrote to memory of 2260 2392 omsecor.exe 30 PID 2260 wrote to memory of 1776 2260 omsecor.exe 34 PID 2260 wrote to memory of 1776 2260 omsecor.exe 34 PID 2260 wrote to memory of 1776 2260 omsecor.exe 34 PID 2260 wrote to memory of 1776 2260 omsecor.exe 34 PID 1776 wrote to memory of 2384 1776 omsecor.exe 35 PID 1776 wrote to memory of 2384 1776 omsecor.exe 35 PID 1776 wrote to memory of 2384 1776 omsecor.exe 35 PID 1776 wrote to memory of 2384 1776 omsecor.exe 35 PID 1776 wrote to memory of 2384 1776 omsecor.exe 35 PID 1776 wrote to memory of 2384 1776 omsecor.exe 35 PID 2384 wrote to memory of 2036 2384 omsecor.exe 36 PID 2384 wrote to memory of 2036 2384 omsecor.exe 36 PID 2384 wrote to memory of 2036 2384 omsecor.exe 36 PID 2384 wrote to memory of 2036 2384 omsecor.exe 36 PID 2036 wrote to memory of 1908 2036 omsecor.exe 37 PID 2036 wrote to memory of 1908 2036 omsecor.exe 37 PID 2036 wrote to memory of 1908 2036 omsecor.exe 37 PID 2036 wrote to memory of 1908 2036 omsecor.exe 37 PID 2036 wrote to memory of 1908 2036 omsecor.exe 37 PID 2036 wrote to memory of 1908 2036 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe"C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exeC:\Users\Admin\AppData\Local\Temp\2d8e2aa0f4c2421d8d882b20f89f5e4ca17868bf68b9494acf1988445a78a79d.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5884c6ba9da110dabdca212d37e1484f2
SHA100a8c7a9a954f4cd30d5de62a0fe987e9cd2b166
SHA256c02f66c916ebf10d40b98bef3f9c6ca67425397a1ccb9baee9cae4b66df369c7
SHA51267e4f10c62fda2b403dfba087b403619fcd3d7d7d3c6bbbafa593f47a6acb4425fdb6950da8e763833816e5bcd46a93d23be69c07c8a4085942d7f621efe8f10
-
Filesize
96KB
MD5b2e0e439a9ce3a31e7c3516ebf819df9
SHA1b67108c957aae04acf8be079a81fbad66983beee
SHA2560eb648b4e121d9f8542577e387f4efe91f19f2b5780e18bd00511f3ae7427238
SHA512e74f15158b2b867411549b806a0cfd9bba026b8b6c05931fd5cf5339ea184088da74bbd258f6966a054874235a45a486767065246ba0a8f670c0debd817f0cca
-
Filesize
96KB
MD58204f7d6906ec4b05a42226b6548b321
SHA121b1ba7db75d6e1ae721fff395a27dbae7bb8344
SHA2561e2537c297a86bf4605db795094778918c0e11d7018d1bdc92117c4890112d0d
SHA512c82c1650db9f4550ac948f47f42831bb8c1f14345e315f4f767d7b0f2d2056bcc01f0e14bc3818a6a3b2363497c7c4af15f9090e51893e6734fa0633077e547b