Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 05:00
Static task
static1
Behavioral task
behavioral1
Sample
97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe
Resource
win7-20241023-en
General
-
Target
97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe
-
Size
96KB
-
MD5
76ca67702b82a2fb7cc03651373091c0
-
SHA1
a18e4a787959e1c36cb601b9e07111e735840d77
-
SHA256
97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925
-
SHA512
3ce9cfa9bf7367885d495df1c746544176c13b85230db7b390b468f32c9e1841a1479e0ed05ec318e08293a86f453ecd38a0a65a2368f30a7f2aa1b6622fb59e
-
SSDEEP
1536:BnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:BGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1908 omsecor.exe 1964 omsecor.exe 2912 omsecor.exe 2584 omsecor.exe 1508 omsecor.exe 2348 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2040 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 2040 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 1908 omsecor.exe 1964 omsecor.exe 1964 omsecor.exe 2584 omsecor.exe 2584 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2412 set thread context of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 1908 set thread context of 1964 1908 omsecor.exe 32 PID 2912 set thread context of 2584 2912 omsecor.exe 36 PID 1508 set thread context of 2348 1508 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 2412 wrote to memory of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 2412 wrote to memory of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 2412 wrote to memory of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 2412 wrote to memory of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 2412 wrote to memory of 2040 2412 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 30 PID 2040 wrote to memory of 1908 2040 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 31 PID 2040 wrote to memory of 1908 2040 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 31 PID 2040 wrote to memory of 1908 2040 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 31 PID 2040 wrote to memory of 1908 2040 97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe 31 PID 1908 wrote to memory of 1964 1908 omsecor.exe 32 PID 1908 wrote to memory of 1964 1908 omsecor.exe 32 PID 1908 wrote to memory of 1964 1908 omsecor.exe 32 PID 1908 wrote to memory of 1964 1908 omsecor.exe 32 PID 1908 wrote to memory of 1964 1908 omsecor.exe 32 PID 1908 wrote to memory of 1964 1908 omsecor.exe 32 PID 1964 wrote to memory of 2912 1964 omsecor.exe 35 PID 1964 wrote to memory of 2912 1964 omsecor.exe 35 PID 1964 wrote to memory of 2912 1964 omsecor.exe 35 PID 1964 wrote to memory of 2912 1964 omsecor.exe 35 PID 2912 wrote to memory of 2584 2912 omsecor.exe 36 PID 2912 wrote to memory of 2584 2912 omsecor.exe 36 PID 2912 wrote to memory of 2584 2912 omsecor.exe 36 PID 2912 wrote to memory of 2584 2912 omsecor.exe 36 PID 2912 wrote to memory of 2584 2912 omsecor.exe 36 PID 2912 wrote to memory of 2584 2912 omsecor.exe 36 PID 2584 wrote to memory of 1508 2584 omsecor.exe 37 PID 2584 wrote to memory of 1508 2584 omsecor.exe 37 PID 2584 wrote to memory of 1508 2584 omsecor.exe 37 PID 2584 wrote to memory of 1508 2584 omsecor.exe 37 PID 1508 wrote to memory of 2348 1508 omsecor.exe 38 PID 1508 wrote to memory of 2348 1508 omsecor.exe 38 PID 1508 wrote to memory of 2348 1508 omsecor.exe 38 PID 1508 wrote to memory of 2348 1508 omsecor.exe 38 PID 1508 wrote to memory of 2348 1508 omsecor.exe 38 PID 1508 wrote to memory of 2348 1508 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe"C:\Users\Admin\AppData\Local\Temp\97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exeC:\Users\Admin\AppData\Local\Temp\97b7f6d840980c909d3333098f12e66b63766baab2abcc539fb95fcb61006925N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5963b5cb51ec30bca1ea2a91dce675260
SHA18cd087e3c19df1ec6f77bd4694630806fed7313d
SHA256edc2a159abd9d69fef6f99c51819e39115762f2e247f0f12de99207f55278847
SHA512f181246ca50950e8d8bb199be9903b12a9f5429aa625e52273c63cd5a9893464a641719ad0ad253d1253ac1e34db8bbf48e96a25b94dee5dff9a67524231a74a
-
Filesize
96KB
MD50d8f681b318fd857c3182cc56c0c2d9c
SHA1410f50af7536c88f855387cb2341604af47cdce4
SHA256d8522e092f57a5dc0f7767b9fab8d70b3947e1938e75cf838e4ba6d7ea56f8fa
SHA5121b3e1f3164d9610a659a1adeab4453b260d676c1a16124211dd2b2631e950b4974df4b71fe2e2d57ab5d531ade79554663928be31b5933a6650ee82497ec3cf8
-
Filesize
96KB
MD57bd497698007eab196ce032c6c11c61f
SHA1d65149cdbbb62bc3829a260af9d4765cdfff735b
SHA256c8cf415c45b695d0b93f3829af7a6e71732044717e36a7b31e8672bdb2adfe35
SHA512ff7e5dd8b5b8878a8357558057484898f922753339d5a8c3ae94ad55a19582c15ce936b65a6083890ab9aea01b62b1e8f3e3893e7cf9fd847e8b0e429c13b93d