Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 19:13
Static task
static1
Behavioral task
behavioral1
Sample
04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe
Resource
win7-20240903-en
General
-
Target
04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe
-
Size
96KB
-
MD5
f16d48d2e484c261b18b4bc51e3e8e67
-
SHA1
33ccefea7655343fb83df731d96546cb39f7395f
-
SHA256
04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f
-
SHA512
ff7155e5f2ed84a04192370b0cd1491e183e7ad51c75ba334f60019a376b6f2ef8c366c3ef65f4b1fa4d211f26d73ea25d956451f31f980d32eb4b4ba864c477
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:TGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2576 omsecor.exe 2324 omsecor.exe 1580 omsecor.exe 1892 omsecor.exe 2032 omsecor.exe 3004 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2848 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 2848 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 2576 omsecor.exe 2324 omsecor.exe 2324 omsecor.exe 1892 omsecor.exe 1892 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2068 set thread context of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2576 set thread context of 2324 2576 omsecor.exe 32 PID 1580 set thread context of 1892 1580 omsecor.exe 36 PID 2032 set thread context of 3004 2032 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2068 wrote to memory of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2068 wrote to memory of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2068 wrote to memory of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2068 wrote to memory of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2068 wrote to memory of 2848 2068 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 30 PID 2848 wrote to memory of 2576 2848 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 31 PID 2848 wrote to memory of 2576 2848 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 31 PID 2848 wrote to memory of 2576 2848 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 31 PID 2848 wrote to memory of 2576 2848 04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe 31 PID 2576 wrote to memory of 2324 2576 omsecor.exe 32 PID 2576 wrote to memory of 2324 2576 omsecor.exe 32 PID 2576 wrote to memory of 2324 2576 omsecor.exe 32 PID 2576 wrote to memory of 2324 2576 omsecor.exe 32 PID 2576 wrote to memory of 2324 2576 omsecor.exe 32 PID 2576 wrote to memory of 2324 2576 omsecor.exe 32 PID 2324 wrote to memory of 1580 2324 omsecor.exe 35 PID 2324 wrote to memory of 1580 2324 omsecor.exe 35 PID 2324 wrote to memory of 1580 2324 omsecor.exe 35 PID 2324 wrote to memory of 1580 2324 omsecor.exe 35 PID 1580 wrote to memory of 1892 1580 omsecor.exe 36 PID 1580 wrote to memory of 1892 1580 omsecor.exe 36 PID 1580 wrote to memory of 1892 1580 omsecor.exe 36 PID 1580 wrote to memory of 1892 1580 omsecor.exe 36 PID 1580 wrote to memory of 1892 1580 omsecor.exe 36 PID 1580 wrote to memory of 1892 1580 omsecor.exe 36 PID 1892 wrote to memory of 2032 1892 omsecor.exe 37 PID 1892 wrote to memory of 2032 1892 omsecor.exe 37 PID 1892 wrote to memory of 2032 1892 omsecor.exe 37 PID 1892 wrote to memory of 2032 1892 omsecor.exe 37 PID 2032 wrote to memory of 3004 2032 omsecor.exe 38 PID 2032 wrote to memory of 3004 2032 omsecor.exe 38 PID 2032 wrote to memory of 3004 2032 omsecor.exe 38 PID 2032 wrote to memory of 3004 2032 omsecor.exe 38 PID 2032 wrote to memory of 3004 2032 omsecor.exe 38 PID 2032 wrote to memory of 3004 2032 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe"C:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exeC:\Users\Admin\AppData\Local\Temp\04e9b625581c9feeab28baae5d98fdb91fea2638cb7bfd4d9884c4a7ff8d516f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c767d4874bef05c1838c65a91c78fc2e
SHA1e37b56e9ea867ae888de9aaeced922c78ebe9dba
SHA256734f6a3e92ac068d3b69140644b81aa7bd0077347cf7a4b9f7736c62c53a092e
SHA5127eff5bd172e75e8046964f1b5eba5bb3da93735d7cceea901bf624b576056e5e03ad87eaf77e7e857802dc5e26b0af4a1861638cb6106ea68d67415e5c7bff01
-
Filesize
96KB
MD57ceb3c8f0e01f0043a841feb89aef12f
SHA11def0b8783a6c3bf72790f2ae8d74819f03f6669
SHA2560adfea1899af03fa0f3bbc805b9ac173e8a53ed0689852ae806a6c08edcda097
SHA51295285b2e37a2af45eec2688258808b20fd6254524ae066c1a233dc3b577ae20a8ba10a26f26297b2d34535a18dff9468efa7b2bfa55a54ad16c5e3f455209dad
-
Filesize
96KB
MD5beee556d369ec3ab3ccde933c57dda60
SHA15513b51144eb5ccdefb599b2616ce79df0b87ebf
SHA256c8be4722a65110ae89966cc3dd4cb0aa78e536879194525e0d156f0dfce8d310
SHA512616b1d9dd88a0c68f447208016e13ae9027c28ae16c94446cc3d1472b37d0634d61679bfeabdc1329760cc1de7f4701facb85c0d64b338ecb6ef2e0d709de8ea