Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 07:38
Static task
static1
Behavioral task
behavioral1
Sample
1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe
Resource
win7-20240903-en
General
-
Target
1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe
-
Size
134KB
-
MD5
f0da3990bb58ff708d349a099019df6b
-
SHA1
350c250ceefbe76c355c7584aaa42be67f823e8f
-
SHA256
1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0
-
SHA512
9aea8ee30d115ebf5f9e3279566c74cc0dba0bf8a1162dc9cc8621ef7f8f600269239287ac8c8a6c88bbee9ee9f9d18c7e321f3e46d95eba74f4f9b64d185819
-
SSDEEP
1536:4DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCif:eiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2284 omsecor.exe 1280 omsecor.exe 1140 omsecor.exe 1268 omsecor.exe 2384 omsecor.exe 1924 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 300 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 300 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 2284 omsecor.exe 1280 omsecor.exe 1280 omsecor.exe 1268 omsecor.exe 1268 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1812 set thread context of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 2284 set thread context of 1280 2284 omsecor.exe 32 PID 1140 set thread context of 1268 1140 omsecor.exe 36 PID 2384 set thread context of 1924 2384 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1812 wrote to memory of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 1812 wrote to memory of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 1812 wrote to memory of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 1812 wrote to memory of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 1812 wrote to memory of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 1812 wrote to memory of 300 1812 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 30 PID 300 wrote to memory of 2284 300 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 31 PID 300 wrote to memory of 2284 300 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 31 PID 300 wrote to memory of 2284 300 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 31 PID 300 wrote to memory of 2284 300 1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe 31 PID 2284 wrote to memory of 1280 2284 omsecor.exe 32 PID 2284 wrote to memory of 1280 2284 omsecor.exe 32 PID 2284 wrote to memory of 1280 2284 omsecor.exe 32 PID 2284 wrote to memory of 1280 2284 omsecor.exe 32 PID 2284 wrote to memory of 1280 2284 omsecor.exe 32 PID 2284 wrote to memory of 1280 2284 omsecor.exe 32 PID 1280 wrote to memory of 1140 1280 omsecor.exe 35 PID 1280 wrote to memory of 1140 1280 omsecor.exe 35 PID 1280 wrote to memory of 1140 1280 omsecor.exe 35 PID 1280 wrote to memory of 1140 1280 omsecor.exe 35 PID 1140 wrote to memory of 1268 1140 omsecor.exe 36 PID 1140 wrote to memory of 1268 1140 omsecor.exe 36 PID 1140 wrote to memory of 1268 1140 omsecor.exe 36 PID 1140 wrote to memory of 1268 1140 omsecor.exe 36 PID 1140 wrote to memory of 1268 1140 omsecor.exe 36 PID 1140 wrote to memory of 1268 1140 omsecor.exe 36 PID 1268 wrote to memory of 2384 1268 omsecor.exe 37 PID 1268 wrote to memory of 2384 1268 omsecor.exe 37 PID 1268 wrote to memory of 2384 1268 omsecor.exe 37 PID 1268 wrote to memory of 2384 1268 omsecor.exe 37 PID 2384 wrote to memory of 1924 2384 omsecor.exe 38 PID 2384 wrote to memory of 1924 2384 omsecor.exe 38 PID 2384 wrote to memory of 1924 2384 omsecor.exe 38 PID 2384 wrote to memory of 1924 2384 omsecor.exe 38 PID 2384 wrote to memory of 1924 2384 omsecor.exe 38 PID 2384 wrote to memory of 1924 2384 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe"C:\Users\Admin\AppData\Local\Temp\1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exeC:\Users\Admin\AppData\Local\Temp\1195c904a55d70dbb68d831abd631394ee1d01ba865e05fbed0c0f240065bef0.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5bfb28f3d6c2da35058c1cadc880438f0
SHA1bb9a747095bf911d675afa43a6103a5fd5ec79bc
SHA2564d5ea6d3d893f6ba7847d9a23225a771c5f37b9b337f2e86c47d152cf399d268
SHA5124130fc9f8036f3d37f47ce845d6f2312532025b454bd1512dcf707746f218124b19ed6bfe436ffb11460d7d92cb759e77ac6e335020a1dc0449398bd45fb0f48
-
Filesize
134KB
MD5e58c41516940f37a5fe6255c209b1a49
SHA18c06ad733424791f5d8492f9e7e3715f0d1f3676
SHA256609e491e6b54a119c6ab5fc55211cff8432ce21c55c27e54ffa1a1f77e2efd33
SHA512d4ffc41e4a9dac86bb50ee075bc893a5dd44531aa249af3e32178c2d7cc0f46afb4035d5e969d6d3eae6cfb5c4a72e019c135e74386cd28ad310a72cd052355c
-
Filesize
134KB
MD56f3dbb11dddf8696a8e7d9d14e453951
SHA149bcca0eac360bccc3700ddce4bb48705af8caf2
SHA2562db9b362fa640ae97e86785588a72b47e3050a856b14e97af85aed69e87c127f
SHA5123bdafb4dbe22e10127990455e27a6a0a67ebb12e3ed6bf9b331a2887891f21fd316b7d6e8bad915ccf9937a9c529652ab101e910537c4f3f32be13cbcc7321fb