Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 00:17
Static task
static1
Behavioral task
behavioral1
Sample
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
Resource
win7-20241010-en
General
-
Target
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe
-
Size
96KB
-
MD5
0b32125002b67d709d253016765b787f
-
SHA1
d2d8b89781791d34def210ea29486033cff64e1c
-
SHA256
79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228
-
SHA512
eee8a9eb9a179c9e4204720770ec561309023b5eeeea93c104577fa078e423e248876cfba33b7ad99c27554f1ca1376c902fe56e62a6793414bdda6399a3daa0
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:ZGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1936 omsecor.exe 2492 omsecor.exe 1784 omsecor.exe 2540 omsecor.exe 1948 omsecor.exe 2864 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2064 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 2064 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 1936 omsecor.exe 2492 omsecor.exe 2492 omsecor.exe 2540 omsecor.exe 2540 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2380 set thread context of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 1936 set thread context of 2492 1936 omsecor.exe 32 PID 1784 set thread context of 2540 1784 omsecor.exe 36 PID 1948 set thread context of 2864 1948 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 2380 wrote to memory of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 2380 wrote to memory of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 2380 wrote to memory of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 2380 wrote to memory of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 2380 wrote to memory of 2064 2380 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 30 PID 2064 wrote to memory of 1936 2064 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 2064 wrote to memory of 1936 2064 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 2064 wrote to memory of 1936 2064 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 2064 wrote to memory of 1936 2064 79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe 31 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 2492 wrote to memory of 1784 2492 omsecor.exe 35 PID 2492 wrote to memory of 1784 2492 omsecor.exe 35 PID 2492 wrote to memory of 1784 2492 omsecor.exe 35 PID 2492 wrote to memory of 1784 2492 omsecor.exe 35 PID 1784 wrote to memory of 2540 1784 omsecor.exe 36 PID 1784 wrote to memory of 2540 1784 omsecor.exe 36 PID 1784 wrote to memory of 2540 1784 omsecor.exe 36 PID 1784 wrote to memory of 2540 1784 omsecor.exe 36 PID 1784 wrote to memory of 2540 1784 omsecor.exe 36 PID 1784 wrote to memory of 2540 1784 omsecor.exe 36 PID 2540 wrote to memory of 1948 2540 omsecor.exe 37 PID 2540 wrote to memory of 1948 2540 omsecor.exe 37 PID 2540 wrote to memory of 1948 2540 omsecor.exe 37 PID 2540 wrote to memory of 1948 2540 omsecor.exe 37 PID 1948 wrote to memory of 2864 1948 omsecor.exe 38 PID 1948 wrote to memory of 2864 1948 omsecor.exe 38 PID 1948 wrote to memory of 2864 1948 omsecor.exe 38 PID 1948 wrote to memory of 2864 1948 omsecor.exe 38 PID 1948 wrote to memory of 2864 1948 omsecor.exe 38 PID 1948 wrote to memory of 2864 1948 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exeC:\Users\Admin\AppData\Local\Temp\79f8d05eaaee25f33b210c8492f489ac1579a22ccee7cd89d3d758c920cdd228.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD526955fa3c0d28ca27e5b5b057c20236a
SHA16707227db0ec5305cc6f064223389da9a20abdde
SHA2568e18a9536229dcefe105c46f87848a0716dc4291e5b8a1ea48c53e7b02ebc1a7
SHA512660686dd51df969784f95e76ab3140ff4c23c5e446553cda85390b468f46a6985afb8822d54e8e0938e918fd0ea4ca213033d96ebc17b3e95b3b6269410f83d0
-
Filesize
96KB
MD543704b349d2f281d39a4eb2ad52030c3
SHA1dd0a7debdc4d421a29f43edd352f1627d4b97e77
SHA25628504f8b50c24054e5592e3f433c90d781d5a997815396474731ba906dd42b6a
SHA51262c91dc22c4a03a8de85ca8d48fe245596e3158b38cf2113f260db7ba016ae9c661a432063f66b7ccea43498c7fa3598f190bc110af773cd5127f0d50015111e
-
Filesize
96KB
MD569b81ec6214c1883af7c46adf69a37db
SHA128dffb687d58058e4a51787a0997ca1e785430c0
SHA256f69e2790306002eb17e9a0cb6f496ac3a787d65a94dbc57408917a3e488a01e0
SHA51280257fd2f5dcd5f75d4354e8a2e0096bf60f84436d0cb4bc7ced34ae7a267c7a78350a4748ca739ec5c650a8cfe3f4e14cf24290e264cec8ae90254ff5e79b44