Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe
Resource
win7-20240903-en
General
-
Target
5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe
-
Size
96KB
-
MD5
73c8725f4cc2e9353e25fc29ba382050
-
SHA1
38a31f74e6df578a4fbce4169bec50937fb85708
-
SHA256
5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5
-
SHA512
bd23f2b3995b41c450a3ba1a8b9d610bd37894afbe1e160086a93dbe213a903233523bcadc4b779eadb8aa042a2d000ad7ee241eac586e03021b214c5c96991c
-
SSDEEP
1536:6nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:6Gs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2584 omsecor.exe 2564 omsecor.exe 2832 omsecor.exe 596 omsecor.exe 2988 omsecor.exe 1812 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1992 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 1992 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 2584 omsecor.exe 2564 omsecor.exe 2564 omsecor.exe 596 omsecor.exe 596 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2364 set thread context of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 2584 set thread context of 2564 2584 omsecor.exe 32 PID 2832 set thread context of 596 2832 omsecor.exe 36 PID 2988 set thread context of 1812 2988 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2364 wrote to memory of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 2364 wrote to memory of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 2364 wrote to memory of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 2364 wrote to memory of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 2364 wrote to memory of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 2364 wrote to memory of 1992 2364 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 30 PID 1992 wrote to memory of 2584 1992 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 31 PID 1992 wrote to memory of 2584 1992 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 31 PID 1992 wrote to memory of 2584 1992 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 31 PID 1992 wrote to memory of 2584 1992 5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe 31 PID 2584 wrote to memory of 2564 2584 omsecor.exe 32 PID 2584 wrote to memory of 2564 2584 omsecor.exe 32 PID 2584 wrote to memory of 2564 2584 omsecor.exe 32 PID 2584 wrote to memory of 2564 2584 omsecor.exe 32 PID 2584 wrote to memory of 2564 2584 omsecor.exe 32 PID 2584 wrote to memory of 2564 2584 omsecor.exe 32 PID 2564 wrote to memory of 2832 2564 omsecor.exe 35 PID 2564 wrote to memory of 2832 2564 omsecor.exe 35 PID 2564 wrote to memory of 2832 2564 omsecor.exe 35 PID 2564 wrote to memory of 2832 2564 omsecor.exe 35 PID 2832 wrote to memory of 596 2832 omsecor.exe 36 PID 2832 wrote to memory of 596 2832 omsecor.exe 36 PID 2832 wrote to memory of 596 2832 omsecor.exe 36 PID 2832 wrote to memory of 596 2832 omsecor.exe 36 PID 2832 wrote to memory of 596 2832 omsecor.exe 36 PID 2832 wrote to memory of 596 2832 omsecor.exe 36 PID 596 wrote to memory of 2988 596 omsecor.exe 37 PID 596 wrote to memory of 2988 596 omsecor.exe 37 PID 596 wrote to memory of 2988 596 omsecor.exe 37 PID 596 wrote to memory of 2988 596 omsecor.exe 37 PID 2988 wrote to memory of 1812 2988 omsecor.exe 38 PID 2988 wrote to memory of 1812 2988 omsecor.exe 38 PID 2988 wrote to memory of 1812 2988 omsecor.exe 38 PID 2988 wrote to memory of 1812 2988 omsecor.exe 38 PID 2988 wrote to memory of 1812 2988 omsecor.exe 38 PID 2988 wrote to memory of 1812 2988 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe"C:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exeC:\Users\Admin\AppData\Local\Temp\5b5d09986c62f72b5ce9ce8e89f901f7908170a6e1899822ba09c324986646a5N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5374166ba8e6fe275f16aa4fb6216ddc9
SHA1cc1dda12e6f091bc20e379a6605ba9b5385df3e5
SHA256547f6a492f7b169571cccc74eb67472d1a880b3097f57418664021b2abaf1e40
SHA5120d470d82b93e63dc2985df2726b500b6ca7e1a55b4d290118bb14cbe1b67a6ac9afd3b298d0847ecabb2bc17ec6399b4b548d66b26aee6714b1d0d21bd4f3236
-
Filesize
96KB
MD5fecd65d71c92d4a0e5b9ba052872439c
SHA1d61f6782e84a029454107a78ca6c8087708804b3
SHA2564a0d8979043d8dee8c02aabeaf53ae5a6de4897d4efb70e23cbc4a7d090a5801
SHA512dec3c045b7e445bf8223ea4614c4d11447604aae644cdc341cd478f92b93b5ad23e07a0e6e97b57dcd152f2b996c341b1bc65b120b009e1ad8b53ffa1b60ed11
-
Filesize
96KB
MD59abaaaf9555c89016925cdf08d3d539b
SHA17dcb78addecea75b3243ad9f5d3deb57375b3c37
SHA256d702cc80d80f323454397cffbd201445243d419db96c5b20fd987063a3602028
SHA51215e9c697fceb50a48e5398ced8bfb56a9002b772ea52cb1677969694b89ee7f36356d3d6053be3be8c217062ba230005ea54f7fa105918c5d14175b0063ee93f