Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe
Resource
win7-20240708-en
General
-
Target
28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe
-
Size
96KB
-
MD5
2aa48b8145f6339db83e49b482ae01c0
-
SHA1
2e489f3d60bb1dab6e016a3f1ffd43d8349eb575
-
SHA256
28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1
-
SHA512
4c67c181274930417d9ea65bd8f333ec4ebc5775913543afad80161281e77658b99f06225b1f1b83e4786bf65da94b1c36be1c7d3a3d74ec55ff120f60011f1c
-
SSDEEP
1536:2nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:2Gs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2748 omsecor.exe 2856 omsecor.exe 2796 omsecor.exe 2336 omsecor.exe 2308 omsecor.exe 2112 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2280 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 2280 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 2748 omsecor.exe 2856 omsecor.exe 2856 omsecor.exe 2336 omsecor.exe 2336 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1900 set thread context of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 2748 set thread context of 2856 2748 omsecor.exe 32 PID 2796 set thread context of 2336 2796 omsecor.exe 35 PID 2308 set thread context of 2112 2308 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 1900 wrote to memory of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 1900 wrote to memory of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 1900 wrote to memory of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 1900 wrote to memory of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 1900 wrote to memory of 2280 1900 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 30 PID 2280 wrote to memory of 2748 2280 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 31 PID 2280 wrote to memory of 2748 2280 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 31 PID 2280 wrote to memory of 2748 2280 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 31 PID 2280 wrote to memory of 2748 2280 28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe 31 PID 2748 wrote to memory of 2856 2748 omsecor.exe 32 PID 2748 wrote to memory of 2856 2748 omsecor.exe 32 PID 2748 wrote to memory of 2856 2748 omsecor.exe 32 PID 2748 wrote to memory of 2856 2748 omsecor.exe 32 PID 2748 wrote to memory of 2856 2748 omsecor.exe 32 PID 2748 wrote to memory of 2856 2748 omsecor.exe 32 PID 2856 wrote to memory of 2796 2856 omsecor.exe 34 PID 2856 wrote to memory of 2796 2856 omsecor.exe 34 PID 2856 wrote to memory of 2796 2856 omsecor.exe 34 PID 2856 wrote to memory of 2796 2856 omsecor.exe 34 PID 2796 wrote to memory of 2336 2796 omsecor.exe 35 PID 2796 wrote to memory of 2336 2796 omsecor.exe 35 PID 2796 wrote to memory of 2336 2796 omsecor.exe 35 PID 2796 wrote to memory of 2336 2796 omsecor.exe 35 PID 2796 wrote to memory of 2336 2796 omsecor.exe 35 PID 2796 wrote to memory of 2336 2796 omsecor.exe 35 PID 2336 wrote to memory of 2308 2336 omsecor.exe 36 PID 2336 wrote to memory of 2308 2336 omsecor.exe 36 PID 2336 wrote to memory of 2308 2336 omsecor.exe 36 PID 2336 wrote to memory of 2308 2336 omsecor.exe 36 PID 2308 wrote to memory of 2112 2308 omsecor.exe 37 PID 2308 wrote to memory of 2112 2308 omsecor.exe 37 PID 2308 wrote to memory of 2112 2308 omsecor.exe 37 PID 2308 wrote to memory of 2112 2308 omsecor.exe 37 PID 2308 wrote to memory of 2112 2308 omsecor.exe 37 PID 2308 wrote to memory of 2112 2308 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe"C:\Users\Admin\AppData\Local\Temp\28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exeC:\Users\Admin\AppData\Local\Temp\28623647b71fd94c2a734b3cd081df488930ea4c91ad80c6c3c8013fb84509e1N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2112
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD573c8725f4cc2e9353e25fc29ba382050
SHA138a31f74e6df578a4fbce4169bec50937fb85708
SHA2565b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5
SHA512bd23f2b3995b41c450a3ba1a8b9d610bd37894afbe1e160086a93dbe213a903233523bcadc4b779eadb8aa042a2d000ad7ee241eac586e03021b214c5c96991c
-
Filesize
96KB
MD55b665c060972ebd65ca3c62fe8791d7b
SHA1254bea5aafd88effe239acda23e9cd2e0b486a09
SHA2569ae8a6876d1da57b00cfff118fdf0d593dd10f728d4c239069bcfc52a96a309a
SHA51277b8a4ad9ca69db289a7763d94f7ef537bcef9e8208a3fab6fd757001337604881de0058447bb77e8fe2bda82b855d6b1287d4fffe64a360d27ba3c29f73b1a1
-
Filesize
96KB
MD5f6b5970fe1d81e7aea7ec1a4b44a617b
SHA1fe0e73cd5b208866c8ae662df790e22801c67975
SHA256733e3e2a389ff79d8cb2971de30293f5fbb2bbe17430f312e91d5c25b274bccc
SHA512001b4fd5f252aa5a5dc128f6852ad502661431c3e49cc56c251b495614ca2705c7731a8e5fface6c37bc4c3db00747842a66c0b8525bbe717d2ca20f6817e83c