Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 00:14
Static task
static1
Behavioral task
behavioral1
Sample
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
Resource
win7-20240903-en
General
-
Target
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
-
Size
96KB
-
MD5
0b32125002b67d709d253016765b787f
-
SHA1
d2d8b89781791d34def210ea29486033cff64e1c
-
SHA256
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228
-
SHA512
eee8a9eb9a179c9e4204720770ec561309023b5eeeea93c104577fa078e423e248876cfba33b7ad99c27554f1ca1376c902fe56e62a6793414bdda6399a3daa0
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:ZGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
Processes:
omsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exepid Process 2444 omsecor.exe 2164 omsecor.exe 1380 omsecor.exe 2724 omsecor.exe 300 omsecor.exe 2920 omsecor.exe -
Loads dropped DLL 7 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exepid Process 2512 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 2512 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 2444 omsecor.exe 2164 omsecor.exe 2164 omsecor.exe 2724 omsecor.exe 2724 omsecor.exe -
Drops file in System32 directory 1 IoCs
Processes:
omsecor.exedescription ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 1796 set thread context of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 2444 set thread context of 2164 2444 omsecor.exe 33 PID 1380 set thread context of 2724 1380 omsecor.exe 36 PID 300 set thread context of 2920 300 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exeomsecor.exedescription pid Process procid_target PID 1796 wrote to memory of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 1796 wrote to memory of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 1796 wrote to memory of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 1796 wrote to memory of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 1796 wrote to memory of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 1796 wrote to memory of 2512 1796 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 2512 wrote to memory of 2444 2512 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 32 PID 2512 wrote to memory of 2444 2512 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 32 PID 2512 wrote to memory of 2444 2512 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 32 PID 2512 wrote to memory of 2444 2512 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 32 PID 2444 wrote to memory of 2164 2444 omsecor.exe 33 PID 2444 wrote to memory of 2164 2444 omsecor.exe 33 PID 2444 wrote to memory of 2164 2444 omsecor.exe 33 PID 2444 wrote to memory of 2164 2444 omsecor.exe 33 PID 2444 wrote to memory of 2164 2444 omsecor.exe 33 PID 2444 wrote to memory of 2164 2444 omsecor.exe 33 PID 2164 wrote to memory of 1380 2164 omsecor.exe 35 PID 2164 wrote to memory of 1380 2164 omsecor.exe 35 PID 2164 wrote to memory of 1380 2164 omsecor.exe 35 PID 2164 wrote to memory of 1380 2164 omsecor.exe 35 PID 1380 wrote to memory of 2724 1380 omsecor.exe 36 PID 1380 wrote to memory of 2724 1380 omsecor.exe 36 PID 1380 wrote to memory of 2724 1380 omsecor.exe 36 PID 1380 wrote to memory of 2724 1380 omsecor.exe 36 PID 1380 wrote to memory of 2724 1380 omsecor.exe 36 PID 1380 wrote to memory of 2724 1380 omsecor.exe 36 PID 2724 wrote to memory of 300 2724 omsecor.exe 37 PID 2724 wrote to memory of 300 2724 omsecor.exe 37 PID 2724 wrote to memory of 300 2724 omsecor.exe 37 PID 2724 wrote to memory of 300 2724 omsecor.exe 37 PID 300 wrote to memory of 2920 300 omsecor.exe 38 PID 300 wrote to memory of 2920 300 omsecor.exe 38 PID 300 wrote to memory of 2920 300 omsecor.exe 38 PID 300 wrote to memory of 2920 300 omsecor.exe 38 PID 300 wrote to memory of 2920 300 omsecor.exe 38 PID 300 wrote to memory of 2920 300 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeC:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD526955fa3c0d28ca27e5b5b057c20236a
SHA16707227db0ec5305cc6f064223389da9a20abdde
SHA2568e18a9536229dcefe105c46f87848a0716dc4291e5b8a1ea48c53e7b02ebc1a7
SHA512660686dd51df969784f95e76ab3140ff4c23c5e446553cda85390b468f46a6985afb8822d54e8e0938e918fd0ea4ca213033d96ebc17b3e95b3b6269410f83d0
-
Filesize
96KB
MD530ef9a40dd2d2576fa1fcffe10e840ca
SHA16cc8422492683741f81a691d6b514d27c1a75942
SHA256575737229f39bcd73d7c00bff9f22053f5f5b25758d2182e64dc326b8bbdfc86
SHA512e77923d8b2c8449ca8db7102f25564f338e7cf904ec9aeb8ee55304634f9adad48b098ec2a28614104b79e692a3847a4dac8972c8d9b1eb59480a04a0e8e439b
-
Filesize
96KB
MD5cdb27e2099463c485734ff02fcc62388
SHA1123546c1a9405496f96a498bd0267a2b0d07bd68
SHA256d72906071f3ba29a0e3ad1483f5615da55f809ad827641a5d222c3f9c529a6f9
SHA512f4d3c7cabf64be5b295df81fa0efea4b70a5c7a9a295725854a25823b88c766fd86a1624121aa83202d590d5f9d7541308224631071499e3a0a6d38dec231b9e