Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe
Resource
win7-20240903-en
General
-
Target
779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe
-
Size
96KB
-
MD5
44e119256f80dc9a7d0e8c9a68a6f1f0
-
SHA1
6547b47e6252fca2e7fec300aa36a9cd654a89d2
-
SHA256
779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4
-
SHA512
16e872ba70f05d1d81c632b722326063b713a943cabb22bec50914fdfb46a2d7f85bde1ff781b38dc0777076c9d4ecfbce6605dc5f6ce7b808dd164e499f6b54
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:OGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2860 omsecor.exe 2908 omsecor.exe 320 omsecor.exe 2992 omsecor.exe 2412 omsecor.exe 1588 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2848 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 2848 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 2860 omsecor.exe 2908 omsecor.exe 2908 omsecor.exe 2992 omsecor.exe 2992 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2820 set thread context of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2860 set thread context of 2908 2860 omsecor.exe 32 PID 320 set thread context of 2992 320 omsecor.exe 36 PID 2412 set thread context of 1588 2412 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2820 wrote to memory of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2820 wrote to memory of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2820 wrote to memory of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2820 wrote to memory of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2820 wrote to memory of 2848 2820 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 30 PID 2848 wrote to memory of 2860 2848 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 31 PID 2848 wrote to memory of 2860 2848 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 31 PID 2848 wrote to memory of 2860 2848 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 31 PID 2848 wrote to memory of 2860 2848 779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe 31 PID 2860 wrote to memory of 2908 2860 omsecor.exe 32 PID 2860 wrote to memory of 2908 2860 omsecor.exe 32 PID 2860 wrote to memory of 2908 2860 omsecor.exe 32 PID 2860 wrote to memory of 2908 2860 omsecor.exe 32 PID 2860 wrote to memory of 2908 2860 omsecor.exe 32 PID 2860 wrote to memory of 2908 2860 omsecor.exe 32 PID 2908 wrote to memory of 320 2908 omsecor.exe 35 PID 2908 wrote to memory of 320 2908 omsecor.exe 35 PID 2908 wrote to memory of 320 2908 omsecor.exe 35 PID 2908 wrote to memory of 320 2908 omsecor.exe 35 PID 320 wrote to memory of 2992 320 omsecor.exe 36 PID 320 wrote to memory of 2992 320 omsecor.exe 36 PID 320 wrote to memory of 2992 320 omsecor.exe 36 PID 320 wrote to memory of 2992 320 omsecor.exe 36 PID 320 wrote to memory of 2992 320 omsecor.exe 36 PID 320 wrote to memory of 2992 320 omsecor.exe 36 PID 2992 wrote to memory of 2412 2992 omsecor.exe 37 PID 2992 wrote to memory of 2412 2992 omsecor.exe 37 PID 2992 wrote to memory of 2412 2992 omsecor.exe 37 PID 2992 wrote to memory of 2412 2992 omsecor.exe 37 PID 2412 wrote to memory of 1588 2412 omsecor.exe 38 PID 2412 wrote to memory of 1588 2412 omsecor.exe 38 PID 2412 wrote to memory of 1588 2412 omsecor.exe 38 PID 2412 wrote to memory of 1588 2412 omsecor.exe 38 PID 2412 wrote to memory of 1588 2412 omsecor.exe 38 PID 2412 wrote to memory of 1588 2412 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe"C:\Users\Admin\AppData\Local\Temp\779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exeC:\Users\Admin\AppData\Local\Temp\779a2a6d6661f4041fd3125ba627955c96cff9fb0929632bc7e4fe960336b8c4N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5298b12735d9c3e76745889a6a1e3b2a3
SHA1313f9cecdac5d349a34d00f6e7a7155eac0f7c10
SHA25695d5e74a97d7087bca7ed2d320128122ea1eeb624983039c335427e73d5b4eb5
SHA51250fe0f82da9d1e4f23dba35388f36dd8e6180f820b3aa747fafedad246688a362ba2104538c1dd216260d44833dcfb8c9f554de7860222a8c80f98a097bfad00
-
Filesize
96KB
MD5b571a6ed360b2c8885be785f5d94345b
SHA198cbdc68dd2818cbffa9407747ecd9b09970f9c0
SHA25625f0f9f81f9609b6d361296e99df8547fcbdd12a68651d0978f58572b86aea40
SHA512a8aa076b2bfe3e5342572c825d0aee896cf2cd6c4cf3b84dacc03d136a1439d3095c4b544874d07fdddfb28f672c87dc3fb4d540ac1afaf10147461bb5081887
-
Filesize
96KB
MD5e45d8daeda90895df7ddd7d6c9271cd6
SHA183e635a204bd0775755d2e945221467e6f67184e
SHA256c9472bd19d98da584139ee73059fe87082440db343749520df1aecb644745c11
SHA512386467414a1115fdd9705278c0d4edc7cdd3c17b192a634ff7ec4ca20a3af6e49af6a023b8caa2431bf9dce23350ff09c5bf7010e48b66ae675253a708f60221