Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe
Resource
win7-20240903-en
General
-
Target
3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe
-
Size
96KB
-
MD5
2417ed6e2b275f1f0f254ffeecf1d9fe
-
SHA1
e77863df7b7a0983b5b4db7958dd301bfaa9b6dc
-
SHA256
3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f
-
SHA512
794f5a0587630a29fc3c91131d26d249b5acf47080b033558361b3edd5ceb4d0dabc2c20f85eef6aa16658794a878a60d332830084594a807249e666d528228f
-
SSDEEP
1536:QnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:QGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2080 omsecor.exe 2852 omsecor.exe 1308 omsecor.exe 2988 omsecor.exe 2136 omsecor.exe 2108 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2832 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 2832 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 2080 omsecor.exe 2852 omsecor.exe 2852 omsecor.exe 2988 omsecor.exe 2988 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2720 set thread context of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2080 set thread context of 2852 2080 omsecor.exe 32 PID 1308 set thread context of 2988 1308 omsecor.exe 36 PID 2136 set thread context of 2108 2136 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2720 wrote to memory of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2720 wrote to memory of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2720 wrote to memory of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2720 wrote to memory of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2720 wrote to memory of 2832 2720 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 30 PID 2832 wrote to memory of 2080 2832 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 31 PID 2832 wrote to memory of 2080 2832 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 31 PID 2832 wrote to memory of 2080 2832 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 31 PID 2832 wrote to memory of 2080 2832 3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe 31 PID 2080 wrote to memory of 2852 2080 omsecor.exe 32 PID 2080 wrote to memory of 2852 2080 omsecor.exe 32 PID 2080 wrote to memory of 2852 2080 omsecor.exe 32 PID 2080 wrote to memory of 2852 2080 omsecor.exe 32 PID 2080 wrote to memory of 2852 2080 omsecor.exe 32 PID 2080 wrote to memory of 2852 2080 omsecor.exe 32 PID 2852 wrote to memory of 1308 2852 omsecor.exe 35 PID 2852 wrote to memory of 1308 2852 omsecor.exe 35 PID 2852 wrote to memory of 1308 2852 omsecor.exe 35 PID 2852 wrote to memory of 1308 2852 omsecor.exe 35 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 2988 wrote to memory of 2136 2988 omsecor.exe 37 PID 2988 wrote to memory of 2136 2988 omsecor.exe 37 PID 2988 wrote to memory of 2136 2988 omsecor.exe 37 PID 2988 wrote to memory of 2136 2988 omsecor.exe 37 PID 2136 wrote to memory of 2108 2136 omsecor.exe 38 PID 2136 wrote to memory of 2108 2136 omsecor.exe 38 PID 2136 wrote to memory of 2108 2136 omsecor.exe 38 PID 2136 wrote to memory of 2108 2136 omsecor.exe 38 PID 2136 wrote to memory of 2108 2136 omsecor.exe 38 PID 2136 wrote to memory of 2108 2136 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe"C:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exeC:\Users\Admin\AppData\Local\Temp\3084467274704f89cc85a340280df7f5afb86f1fc4cc95de3ab452a3235f843f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5bcb66cc3f20450c9b9adee6530b57e48
SHA10aaa7f52a78f784821eb67625d2b36f150e3e77f
SHA2567e6d328fc82a19fc346bfe9e3e41a7e4cc30d1c89f06605d498be76e9491dc04
SHA512883564c35399babaf5cd1b7e5bc9de2f9cf838bb4963a0a359c6f238f11bd536a29ab6904824178214fe7d203df2969ac0009880011262cd84a1bf8d9a5eef86
-
Filesize
96KB
MD5443fd0234124d68ee699892e3651428a
SHA10e49aa209388453aa922c998f7e8ac6e7f993276
SHA2562f7e3ee2db0920fc6e2b23ed4d1c1fad7b8a06dff35a8523bf4d8194494d8dd0
SHA5126cc8a9b8858e556eccd1a8640b2e81f345903da61c4a722960061a6b0120f94230b44c78e377972b35b988c497356ba865dc90d64c36aba22dbd2b8e172c0005
-
Filesize
96KB
MD531a9caa67cb84098d90c5f434c67080e
SHA11d31f673023c1fd01f16f408f110e87ecc23dbb2
SHA25680d6b6eeecf286b343cf9a445c4e83caf4d47dde203abffdd7df867f3811c587
SHA512a59209061ceaaa0817f5c486b0486338b039043f5b6ff99895e697f4dbf23ee33025d14d0d9ea3521dc6134cbdb5d315f249ebf7df9d21069c52214de8869d0b