Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe
Resource
win7-20240903-en
General
-
Target
fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe
-
Size
96KB
-
MD5
f0d13b0277df2e4993d830536d860510
-
SHA1
9341e18dcfe93ac48971fc0967383a919a036e63
-
SHA256
fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04
-
SHA512
94f134046f8761f808b30784f4e4496338812104ed1a0313746116b4b39e644cc7dd33df6d1d40e6f7c009f016a311ba118dac46e081d864f0d7f26df5eb2074
-
SSDEEP
1536:JnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:JGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2804 omsecor.exe 1272 omsecor.exe 2340 omsecor.exe 2780 omsecor.exe 2684 omsecor.exe 2008 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3068 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 3068 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 2804 omsecor.exe 1272 omsecor.exe 1272 omsecor.exe 2780 omsecor.exe 2780 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2888 set thread context of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 2804 set thread context of 1272 2804 omsecor.exe 32 PID 2340 set thread context of 2780 2340 omsecor.exe 36 PID 2684 set thread context of 2008 2684 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 2888 wrote to memory of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 2888 wrote to memory of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 2888 wrote to memory of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 2888 wrote to memory of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 2888 wrote to memory of 3068 2888 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 30 PID 3068 wrote to memory of 2804 3068 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 31 PID 3068 wrote to memory of 2804 3068 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 31 PID 3068 wrote to memory of 2804 3068 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 31 PID 3068 wrote to memory of 2804 3068 fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe 31 PID 2804 wrote to memory of 1272 2804 omsecor.exe 32 PID 2804 wrote to memory of 1272 2804 omsecor.exe 32 PID 2804 wrote to memory of 1272 2804 omsecor.exe 32 PID 2804 wrote to memory of 1272 2804 omsecor.exe 32 PID 2804 wrote to memory of 1272 2804 omsecor.exe 32 PID 2804 wrote to memory of 1272 2804 omsecor.exe 32 PID 1272 wrote to memory of 2340 1272 omsecor.exe 35 PID 1272 wrote to memory of 2340 1272 omsecor.exe 35 PID 1272 wrote to memory of 2340 1272 omsecor.exe 35 PID 1272 wrote to memory of 2340 1272 omsecor.exe 35 PID 2340 wrote to memory of 2780 2340 omsecor.exe 36 PID 2340 wrote to memory of 2780 2340 omsecor.exe 36 PID 2340 wrote to memory of 2780 2340 omsecor.exe 36 PID 2340 wrote to memory of 2780 2340 omsecor.exe 36 PID 2340 wrote to memory of 2780 2340 omsecor.exe 36 PID 2340 wrote to memory of 2780 2340 omsecor.exe 36 PID 2780 wrote to memory of 2684 2780 omsecor.exe 37 PID 2780 wrote to memory of 2684 2780 omsecor.exe 37 PID 2780 wrote to memory of 2684 2780 omsecor.exe 37 PID 2780 wrote to memory of 2684 2780 omsecor.exe 37 PID 2684 wrote to memory of 2008 2684 omsecor.exe 38 PID 2684 wrote to memory of 2008 2684 omsecor.exe 38 PID 2684 wrote to memory of 2008 2684 omsecor.exe 38 PID 2684 wrote to memory of 2008 2684 omsecor.exe 38 PID 2684 wrote to memory of 2008 2684 omsecor.exe 38 PID 2684 wrote to memory of 2008 2684 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe"C:\Users\Admin\AppData\Local\Temp\fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exeC:\Users\Admin\AppData\Local\Temp\fa85e93d6bb10cd45da3d23881b838218ec90368e0c164f8f99ac0d5bdf64c04N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50ae1cc98e9cdc7a7a4ae9043615e68c9
SHA108122a48414e92f60b82d2a87288e1ed721e9f8b
SHA256e9fa7044528df787d676eaf27b4fd73185563ed004809e56b00969c8aa0ffd12
SHA5125e041e85922aa7f8166d058a4b5cbfb551e65a698c1ccba00200e8e05d864883447f2e6100d5dc0e512714dc2babb42dad5312588f898f4724902452d3664735
-
Filesize
96KB
MD551bbde30e34fc9ec32aeaa3e8a5f23ff
SHA170c7327adc307c938c175b04eb92107fe4d7dedc
SHA2568318a3ddd5f2dcec9827cafc51e0542bbd933edaaaa536d2582a6125e8bd755c
SHA5128f665866a32f5b080fb9b8904cf219c226473851b07cdd7b932ee1bc81b7c59979edcf8675f14c7ce2885326d9400328b15660ebdf14c942719b2e883c9d233b
-
Filesize
96KB
MD531a3558573e1fc5d5b21b5ced9b44f02
SHA1d1a2d5efc188743cfb4d6149a7c95e4363d883a3
SHA2562c2ad6c2fbc495ddbe4c86fd7eb80685901ef97a1d2bf3a3a769d44f34cff899
SHA5126c6b7eb88135896f54a81bc3f2cb558c51306deb710a39bf080bfb8e57c46a4e78ae366b091ab5e2777aece830a51526baf0f05be450bf17a10eefb2eda37209