Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe
Resource
win7-20241010-en
General
-
Target
1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe
-
Size
96KB
-
MD5
ddd2c39f3e07b4a00271a18f28af5500
-
SHA1
404924769d864f072a159730c634db28b1afee4f
-
SHA256
1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906
-
SHA512
f6d6f0ba4567246cfb27d95350a5f6f5feecc268f07be7a7f88bd501f3a28219205d29f6ec07849201bbbf81d3596ed42b5abb762ab9586f1fe62fc55d131759
-
SSDEEP
1536:wnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:wGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1948 omsecor.exe 2364 omsecor.exe 2264 omsecor.exe 1044 omsecor.exe 1396 omsecor.exe 2556 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1980 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 1980 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 1948 omsecor.exe 2364 omsecor.exe 2364 omsecor.exe 1044 omsecor.exe 1044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1996 set thread context of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1948 set thread context of 2364 1948 omsecor.exe 32 PID 2264 set thread context of 1044 2264 omsecor.exe 36 PID 1396 set thread context of 2556 1396 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1996 wrote to memory of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1996 wrote to memory of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1996 wrote to memory of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1996 wrote to memory of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1996 wrote to memory of 1980 1996 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 30 PID 1980 wrote to memory of 1948 1980 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 31 PID 1980 wrote to memory of 1948 1980 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 31 PID 1980 wrote to memory of 1948 1980 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 31 PID 1980 wrote to memory of 1948 1980 1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe 31 PID 1948 wrote to memory of 2364 1948 omsecor.exe 32 PID 1948 wrote to memory of 2364 1948 omsecor.exe 32 PID 1948 wrote to memory of 2364 1948 omsecor.exe 32 PID 1948 wrote to memory of 2364 1948 omsecor.exe 32 PID 1948 wrote to memory of 2364 1948 omsecor.exe 32 PID 1948 wrote to memory of 2364 1948 omsecor.exe 32 PID 2364 wrote to memory of 2264 2364 omsecor.exe 35 PID 2364 wrote to memory of 2264 2364 omsecor.exe 35 PID 2364 wrote to memory of 2264 2364 omsecor.exe 35 PID 2364 wrote to memory of 2264 2364 omsecor.exe 35 PID 2264 wrote to memory of 1044 2264 omsecor.exe 36 PID 2264 wrote to memory of 1044 2264 omsecor.exe 36 PID 2264 wrote to memory of 1044 2264 omsecor.exe 36 PID 2264 wrote to memory of 1044 2264 omsecor.exe 36 PID 2264 wrote to memory of 1044 2264 omsecor.exe 36 PID 2264 wrote to memory of 1044 2264 omsecor.exe 36 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe"C:\Users\Admin\AppData\Local\Temp\1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exeC:\Users\Admin\AppData\Local\Temp\1caa30a001040b0dda92622af98b954b07066e5936c937da760707202dd06906N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a1cd9c574bb219a09569da47b97f1e53
SHA13025e1a86a6b5ff0332cbf0cb7cb91d5087500a7
SHA2569090936c41b6ebafa02ff07c10c00956935937226678d22d54b574291ff68638
SHA512e5ef197852c9fe78eaaeba95a5fe611f45daa4b7288b2cf02561591e33efab7fcdc38f4c7cfb143215a6aa0b96b717dde59115307aeec10db457eefde29e043c
-
Filesize
96KB
MD55891c760b3f3f0c60778fc4e386869cf
SHA17e6a5b37b8bd38f2bfc2ff1948081bab9ead15c8
SHA2565aea8670afd236f90d7af5f158398a058747efb6d0f544790c2bd82d14f24949
SHA512f09f0fe2446d4587a24a4c7ff526493d9918e80658fc625e707263a730fc44f9522fe06718331e7af5dc23f4076ff6606e2ea01d6620b621fd54060c8727d531
-
Filesize
96KB
MD533c70d6e84fede446df772ad14836fef
SHA15191f6e38a682cb1bc370e3a6278108e79aef91d
SHA2560e271c35c2ffb31c2a9c2fd6c5308823d554f4dba97023ad368c862fb7a297e2
SHA512e3362a7994c19ef8e3653e5f61e6b5339a3b1d696b1bdc089d440c3f0bedb8848bcacbb6baab6050fd83d40cfb5c37e4302f2e42b5f2b5c7e0d3bc08ee7d0632