Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe
Resource
win7-20241010-en
General
-
Target
869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe
-
Size
96KB
-
MD5
bc9ddeed73da5ffbb2dbed320facfc60
-
SHA1
b932015410eaa2c0688909091d6caa894d9dd07d
-
SHA256
869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2
-
SHA512
7cfab65c912f44018b4e88fc147cb5e6d03a69c4a5167de315503180a78726634713b6fd9a3a5e131663b4878770f547d90373cbd4609e399cabda04fbd29fba
-
SSDEEP
1536:knAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:kGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid Process 1748 omsecor.exe 3000 omsecor.exe 1912 omsecor.exe 632 omsecor.exe 1944 omsecor.exe 1816 omsecor.exe -
Loads dropped DLL 7 IoCs
Processes:
869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exeomsecor.exeomsecor.exeomsecor.exepid Process 2160 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 2160 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 1748 omsecor.exe 3000 omsecor.exe 3000 omsecor.exe 632 omsecor.exe 632 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 2708 set thread context of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 1748 set thread context of 3000 1748 omsecor.exe 32 PID 1912 set thread context of 632 1912 omsecor.exe 36 PID 1944 set thread context of 1816 1944 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
omsecor.exeomsecor.exe869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 2708 wrote to memory of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 2708 wrote to memory of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 2708 wrote to memory of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 2708 wrote to memory of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 2708 wrote to memory of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 2708 wrote to memory of 2160 2708 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 30 PID 2160 wrote to memory of 1748 2160 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 31 PID 2160 wrote to memory of 1748 2160 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 31 PID 2160 wrote to memory of 1748 2160 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 31 PID 2160 wrote to memory of 1748 2160 869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe 31 PID 1748 wrote to memory of 3000 1748 omsecor.exe 32 PID 1748 wrote to memory of 3000 1748 omsecor.exe 32 PID 1748 wrote to memory of 3000 1748 omsecor.exe 32 PID 1748 wrote to memory of 3000 1748 omsecor.exe 32 PID 1748 wrote to memory of 3000 1748 omsecor.exe 32 PID 1748 wrote to memory of 3000 1748 omsecor.exe 32 PID 3000 wrote to memory of 1912 3000 omsecor.exe 35 PID 3000 wrote to memory of 1912 3000 omsecor.exe 35 PID 3000 wrote to memory of 1912 3000 omsecor.exe 35 PID 3000 wrote to memory of 1912 3000 omsecor.exe 35 PID 1912 wrote to memory of 632 1912 omsecor.exe 36 PID 1912 wrote to memory of 632 1912 omsecor.exe 36 PID 1912 wrote to memory of 632 1912 omsecor.exe 36 PID 1912 wrote to memory of 632 1912 omsecor.exe 36 PID 1912 wrote to memory of 632 1912 omsecor.exe 36 PID 1912 wrote to memory of 632 1912 omsecor.exe 36 PID 632 wrote to memory of 1944 632 omsecor.exe 37 PID 632 wrote to memory of 1944 632 omsecor.exe 37 PID 632 wrote to memory of 1944 632 omsecor.exe 37 PID 632 wrote to memory of 1944 632 omsecor.exe 37 PID 1944 wrote to memory of 1816 1944 omsecor.exe 38 PID 1944 wrote to memory of 1816 1944 omsecor.exe 38 PID 1944 wrote to memory of 1816 1944 omsecor.exe 38 PID 1944 wrote to memory of 1816 1944 omsecor.exe 38 PID 1944 wrote to memory of 1816 1944 omsecor.exe 38 PID 1944 wrote to memory of 1816 1944 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe"C:\Users\Admin\AppData\Local\Temp\869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exeC:\Users\Admin\AppData\Local\Temp\869edb9e93d628a4e6b9f9eb6498eea072459c1f1c61af4d322dd747d64de3b2N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5d8a2e57b7aec100f2f52ff3393b79de1
SHA1fb4fa397acbcb5b1a52e0f0163ad8ac9152fe588
SHA256c7595122b2366ccbb1ab0e1f83532073b0b1d3d513363516dea09871af6a4800
SHA512e6d022c44dddcc688167b8f14a7fbce014c3a8a4a08f83e64611d0345a04c852b4ecfee35e7193aedcd8428ff1ab5a7750767677620fe18d7d6ec35da5bbd406
-
Filesize
96KB
MD59deb20a6328d575a32f344f6f38f4aa6
SHA193b682b0ee1dcb836a4da87a81317058c08794eb
SHA256110e70af360536697d020bed6c8ac5634e48d50e904d4d59b27a980ecb114934
SHA5122cd86c55cd56d5dc53fbab43dafa957fa21169e34b5ea769c694ffcb38906f4ecf32db4ed206bab5bc6976fe0aba442512d0d18666d4af27db4660ecfe8f186d
-
Filesize
96KB
MD57078eff12bc0abe3d764da633a462455
SHA14ab39dc544e3876879c25414a449cbf32e6a25d3
SHA2567624c4e457b60053affbc51ac26b6bbd12afa91908ed5ea0054cf33469dd220a
SHA512e1412c75e1d3d410256d830157b14be0007e6ddf908eefc65ee3af004a7c5a549c6b7fb8b6b9d969d5549ca72fb562e75d7d88bf448d107a4a8082f0729973bc