Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/11/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe
Resource
win7-20240903-en
General
-
Target
9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe
-
Size
96KB
-
MD5
468f4e308bec51282f209fa085b68c7c
-
SHA1
2dab0eb298d5033b0b0ebc2c6a001c24f59e7b8d
-
SHA256
9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192
-
SHA512
e4de47196429da4608890eda4fce50741ff8996e6b1597d7ff43c4f2a4149dce390318c097ace1c1b726a791c0792c11bbeeb5d2c8ae1a9d1520cc5e308d4b58
-
SSDEEP
1536:3nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:3Gs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2128 omsecor.exe 2604 omsecor.exe 1580 omsecor.exe 2400 omsecor.exe 2028 omsecor.exe 1680 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2848 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 2848 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 2128 omsecor.exe 2604 omsecor.exe 2604 omsecor.exe 2400 omsecor.exe 2400 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2068 set thread context of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2128 set thread context of 2604 2128 omsecor.exe 32 PID 1580 set thread context of 2400 1580 omsecor.exe 36 PID 2028 set thread context of 1680 2028 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2068 wrote to memory of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2068 wrote to memory of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2068 wrote to memory of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2068 wrote to memory of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2068 wrote to memory of 2848 2068 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 30 PID 2848 wrote to memory of 2128 2848 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 31 PID 2848 wrote to memory of 2128 2848 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 31 PID 2848 wrote to memory of 2128 2848 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 31 PID 2848 wrote to memory of 2128 2848 9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe 31 PID 2128 wrote to memory of 2604 2128 omsecor.exe 32 PID 2128 wrote to memory of 2604 2128 omsecor.exe 32 PID 2128 wrote to memory of 2604 2128 omsecor.exe 32 PID 2128 wrote to memory of 2604 2128 omsecor.exe 32 PID 2128 wrote to memory of 2604 2128 omsecor.exe 32 PID 2128 wrote to memory of 2604 2128 omsecor.exe 32 PID 2604 wrote to memory of 1580 2604 omsecor.exe 35 PID 2604 wrote to memory of 1580 2604 omsecor.exe 35 PID 2604 wrote to memory of 1580 2604 omsecor.exe 35 PID 2604 wrote to memory of 1580 2604 omsecor.exe 35 PID 1580 wrote to memory of 2400 1580 omsecor.exe 36 PID 1580 wrote to memory of 2400 1580 omsecor.exe 36 PID 1580 wrote to memory of 2400 1580 omsecor.exe 36 PID 1580 wrote to memory of 2400 1580 omsecor.exe 36 PID 1580 wrote to memory of 2400 1580 omsecor.exe 36 PID 1580 wrote to memory of 2400 1580 omsecor.exe 36 PID 2400 wrote to memory of 2028 2400 omsecor.exe 37 PID 2400 wrote to memory of 2028 2400 omsecor.exe 37 PID 2400 wrote to memory of 2028 2400 omsecor.exe 37 PID 2400 wrote to memory of 2028 2400 omsecor.exe 37 PID 2028 wrote to memory of 1680 2028 omsecor.exe 38 PID 2028 wrote to memory of 1680 2028 omsecor.exe 38 PID 2028 wrote to memory of 1680 2028 omsecor.exe 38 PID 2028 wrote to memory of 1680 2028 omsecor.exe 38 PID 2028 wrote to memory of 1680 2028 omsecor.exe 38 PID 2028 wrote to memory of 1680 2028 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe"C:\Users\Admin\AppData\Local\Temp\9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exeC:\Users\Admin\AppData\Local\Temp\9a71894a23cf803d357cab87d709bc66acdf7285b18a572c8f65c550400e6192.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD529cf80c80d32d8852a725ebe0f27b456
SHA1d1ca960db020be206d07c3b2e5f3d93a79764767
SHA256191db51fe74520ede684cf7182a1f670791e55b214c377fcf54d7b147059dc44
SHA512ddb8a95581826048dfda4ad27527a9f2a5865aa71846f0baf04f4c53c42830f42d9461939aa90e1bef32553e2be46e04ab030e4887d751e5224fe53db10afab1
-
Filesize
96KB
MD5a9787dde25410b91e0f805b3635f99fb
SHA1e6ff1e1aaf7833b39b018105c2c9056e9a5ab6ca
SHA256e8affb94f696fba3c21b45363e78babf83454f071dc2c0252444d997a1e4983a
SHA512735fe30f79ab8434c203967542efef7ea7758326aae3c941e374239055a6c9bec466f45df32510fc8c7342f408b7263cd981d4c04568d6c8a0091341d72fdf1b
-
Filesize
96KB
MD5126c3c85abde5cbe14843aca62103ffc
SHA1ed87e7d09fb64ea272c11a6c9ad3ecd7b49793aa
SHA256be0ac4c556cb7eb12ec448e6c40424ea17f91feca1249855d7c02be97c4f215e
SHA512aa760953642ca04b68421c3a5a10008deee70b2f6d89412e58e8a79e568399eb0f572fed02f7bc9b89a4acca8cf6d22e6e08800ef05754936adac474b1c826ab