Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe
Resource
win7-20240903-en
General
-
Target
e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe
-
Size
96KB
-
MD5
0d4c77c54e03092885eca451826d6600
-
SHA1
1bc3797d27d6eceee9ba08bb9db68307e413baf4
-
SHA256
e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7
-
SHA512
417e8604b5fe1e1b59d9800262c252046a44a5ea4af73b7b1de38aed9d7cb27b1258ad25c511a11f567ac14f49ff44c717c84a8fd3f6b200cf487c7e02a4fa1e
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:hGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2616 omsecor.exe 2944 omsecor.exe 2848 omsecor.exe 1820 omsecor.exe 1924 omsecor.exe 3020 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2820 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 2820 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 2616 omsecor.exe 2944 omsecor.exe 2944 omsecor.exe 1820 omsecor.exe 1820 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2756 set thread context of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2616 set thread context of 2944 2616 omsecor.exe 32 PID 2848 set thread context of 1820 2848 omsecor.exe 36 PID 1924 set thread context of 3020 1924 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2756 wrote to memory of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2756 wrote to memory of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2756 wrote to memory of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2756 wrote to memory of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2756 wrote to memory of 2820 2756 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 30 PID 2820 wrote to memory of 2616 2820 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 31 PID 2820 wrote to memory of 2616 2820 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 31 PID 2820 wrote to memory of 2616 2820 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 31 PID 2820 wrote to memory of 2616 2820 e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe 31 PID 2616 wrote to memory of 2944 2616 omsecor.exe 32 PID 2616 wrote to memory of 2944 2616 omsecor.exe 32 PID 2616 wrote to memory of 2944 2616 omsecor.exe 32 PID 2616 wrote to memory of 2944 2616 omsecor.exe 32 PID 2616 wrote to memory of 2944 2616 omsecor.exe 32 PID 2616 wrote to memory of 2944 2616 omsecor.exe 32 PID 2944 wrote to memory of 2848 2944 omsecor.exe 35 PID 2944 wrote to memory of 2848 2944 omsecor.exe 35 PID 2944 wrote to memory of 2848 2944 omsecor.exe 35 PID 2944 wrote to memory of 2848 2944 omsecor.exe 35 PID 2848 wrote to memory of 1820 2848 omsecor.exe 36 PID 2848 wrote to memory of 1820 2848 omsecor.exe 36 PID 2848 wrote to memory of 1820 2848 omsecor.exe 36 PID 2848 wrote to memory of 1820 2848 omsecor.exe 36 PID 2848 wrote to memory of 1820 2848 omsecor.exe 36 PID 2848 wrote to memory of 1820 2848 omsecor.exe 36 PID 1820 wrote to memory of 1924 1820 omsecor.exe 37 PID 1820 wrote to memory of 1924 1820 omsecor.exe 37 PID 1820 wrote to memory of 1924 1820 omsecor.exe 37 PID 1820 wrote to memory of 1924 1820 omsecor.exe 37 PID 1924 wrote to memory of 3020 1924 omsecor.exe 38 PID 1924 wrote to memory of 3020 1924 omsecor.exe 38 PID 1924 wrote to memory of 3020 1924 omsecor.exe 38 PID 1924 wrote to memory of 3020 1924 omsecor.exe 38 PID 1924 wrote to memory of 3020 1924 omsecor.exe 38 PID 1924 wrote to memory of 3020 1924 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe"C:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exeC:\Users\Admin\AppData\Local\Temp\e19823d1263edbef945636c31007b9c79dd0c6a72bc11da015996210d7b622f7N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3020
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56f68c06e99a7f34d04659a9a740c32e7
SHA126be548942cb021255d6bb67a73cd24610510702
SHA25631e69f71593255d0e69dd1086b2674782b08f84ffc1d7c57c2b7e793c2539b34
SHA512c5c77287c575b1aa7c34d83aa281c5ebc0d7f38b7cb6495936e700d7ddc5f378db9e6014ae20f649c78d7e4bf25b2b96294b50139333a71c5c39b92e1d3bff1b
-
Filesize
96KB
MD5df78724b42c80b48e6ecd2669edb97f4
SHA1d6a51da925fcfcc4cb1a21867c4a9292f07ebe3d
SHA2561f0ca7fd7a920a88eb0ac85e70c94b8dbf3d59af0d60d2b3ea8e1f0c8ca26fa1
SHA5122406d1ad2ce9ae7f6724b935fd8b0b2fcbe1e12d054842bdfca1de743d7746984f05b1324985ac132cf6cbffdc473db32fced762fa8ed10796a0adc04a907e07
-
Filesize
96KB
MD5f3bdfc09b96a3cb308285ce23ba60d88
SHA1c3e7180565f43d734e286d753c85035712f380b0
SHA256e227116a7d21093659aba368f1c81a44e9b93e39a07df8d62edba546d02bcc6c
SHA5125d541b0a312ce400c160e771c8be655e1284fb922837cb92353f0cf2add1f5afc46f7158319a38ef180556ca8b222b15aef898c89a63d32e7c6f9e678e10847e