Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe
Resource
win7-20240903-en
General
-
Target
0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe
-
Size
134KB
-
MD5
cfce42e278831f3cdca01f86bc500a60
-
SHA1
b42ff30289417a450eba87faf37198fa733878df
-
SHA256
0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16d
-
SHA512
0880b8f2e7805e68bfa5c9276f8ce9415f2be878d64abad3c62b1552db2ccd61de493726b50e0d1b2098d814969c168cb0bbaf928609a80aeb0f5aa34a31aac0
-
SSDEEP
1536:kDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:6iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2804 omsecor.exe 2756 omsecor.exe 2888 omsecor.exe 2304 omsecor.exe 376 omsecor.exe 2108 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2124 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 2124 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 2804 omsecor.exe 2756 omsecor.exe 2756 omsecor.exe 2304 omsecor.exe 2304 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2648 set thread context of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2804 set thread context of 2756 2804 omsecor.exe 32 PID 2888 set thread context of 2304 2888 omsecor.exe 35 PID 376 set thread context of 2108 376 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2648 wrote to memory of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2648 wrote to memory of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2648 wrote to memory of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2648 wrote to memory of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2648 wrote to memory of 2124 2648 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 30 PID 2124 wrote to memory of 2804 2124 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 31 PID 2124 wrote to memory of 2804 2124 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 31 PID 2124 wrote to memory of 2804 2124 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 31 PID 2124 wrote to memory of 2804 2124 0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe 31 PID 2804 wrote to memory of 2756 2804 omsecor.exe 32 PID 2804 wrote to memory of 2756 2804 omsecor.exe 32 PID 2804 wrote to memory of 2756 2804 omsecor.exe 32 PID 2804 wrote to memory of 2756 2804 omsecor.exe 32 PID 2804 wrote to memory of 2756 2804 omsecor.exe 32 PID 2804 wrote to memory of 2756 2804 omsecor.exe 32 PID 2756 wrote to memory of 2888 2756 omsecor.exe 34 PID 2756 wrote to memory of 2888 2756 omsecor.exe 34 PID 2756 wrote to memory of 2888 2756 omsecor.exe 34 PID 2756 wrote to memory of 2888 2756 omsecor.exe 34 PID 2888 wrote to memory of 2304 2888 omsecor.exe 35 PID 2888 wrote to memory of 2304 2888 omsecor.exe 35 PID 2888 wrote to memory of 2304 2888 omsecor.exe 35 PID 2888 wrote to memory of 2304 2888 omsecor.exe 35 PID 2888 wrote to memory of 2304 2888 omsecor.exe 35 PID 2888 wrote to memory of 2304 2888 omsecor.exe 35 PID 2304 wrote to memory of 376 2304 omsecor.exe 36 PID 2304 wrote to memory of 376 2304 omsecor.exe 36 PID 2304 wrote to memory of 376 2304 omsecor.exe 36 PID 2304 wrote to memory of 376 2304 omsecor.exe 36 PID 376 wrote to memory of 2108 376 omsecor.exe 37 PID 376 wrote to memory of 2108 376 omsecor.exe 37 PID 376 wrote to memory of 2108 376 omsecor.exe 37 PID 376 wrote to memory of 2108 376 omsecor.exe 37 PID 376 wrote to memory of 2108 376 omsecor.exe 37 PID 376 wrote to memory of 2108 376 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe"C:\Users\Admin\AppData\Local\Temp\0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exeC:\Users\Admin\AppData\Local\Temp\0103c8b2dc025104e9dc15635bed3cd2aae8d1fdf05b66c6f9d29c5997d2a16dN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56a26bb28d5ab9e50788f001ac365926e
SHA1b509b8b2f26db188d26fdfc248c160b06c1ce9d5
SHA256d7c2057eeffd04a2c8f8f03e6dab957bbe9801cf30a478aaa057ba7c7644c117
SHA5127eaaa0fb0c974b09dd143c36bf610a268e0cb5a20a6289eab9e116e6746e839cf93deaf7a60df8a65fff792eb645de8fb0cb7c1582e6a9f492cfcf7913f86286
-
Filesize
134KB
MD5fdebb57156c0828d5487ffb9f7c49f46
SHA19d5e9223baef5b9dba2e653a1f4bd97ed46b6aeb
SHA2569e2db712645995dd9573ab0e73be604066782e3ae994b5da9001124abf552522
SHA512286e045e4cd3db75250e0172ed086dd1e1972a42a0f01bb18bbe0118d99e64235b39fd39b7d358e1ef9e077854af84029d686b5e071f293912d23db2811f7403
-
Filesize
134KB
MD560baa41e6e70924d74203d2a211de173
SHA19e81490530b55d3a026a3c8247f019eb62388a5a
SHA256088dcfb108ab5ef2138f91e3c946ec25ab7a2bb3736ebfc202727aee7e117fc8
SHA512f61089b3eed87aa0c689cf6af5d9eb0be7ae5b63f29d1444b398db466af0b91b9c36f0f164e122db8b5ff5c5b8bb1e1e0e0ac86fcb7cc5ac266c61d31c182cee