Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 10:40
Static task
static1
Behavioral task
behavioral1
Sample
dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe
Resource
win7-20240903-en
General
-
Target
dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe
-
Size
96KB
-
MD5
546e3573ac5bff547811b44fb4ec56e0
-
SHA1
d0ea09b1c9554d0b59ecd0e87195297d82b7057c
-
SHA256
dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98
-
SHA512
bace3256111add09e8eb5399e0a0e1c80367fbdb7d86ecad8dc1fd217fe89ed1804b1402951335ed82657f37407d76c26653b68f6ab806390b925ff714f8ca9d
-
SSDEEP
1536:OnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:OGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2076 omsecor.exe 2852 omsecor.exe 2868 omsecor.exe 1612 omsecor.exe 1948 omsecor.exe 2920 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 1200 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 2076 omsecor.exe 2852 omsecor.exe 2852 omsecor.exe 1612 omsecor.exe 1612 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2448 set thread context of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 2076 set thread context of 2852 2076 omsecor.exe 33 PID 2868 set thread context of 1612 2868 omsecor.exe 36 PID 1948 set thread context of 2920 1948 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 2448 wrote to memory of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 2448 wrote to memory of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 2448 wrote to memory of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 2448 wrote to memory of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 2448 wrote to memory of 1200 2448 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 31 PID 1200 wrote to memory of 2076 1200 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 32 PID 1200 wrote to memory of 2076 1200 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 32 PID 1200 wrote to memory of 2076 1200 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 32 PID 1200 wrote to memory of 2076 1200 dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe 32 PID 2076 wrote to memory of 2852 2076 omsecor.exe 33 PID 2076 wrote to memory of 2852 2076 omsecor.exe 33 PID 2076 wrote to memory of 2852 2076 omsecor.exe 33 PID 2076 wrote to memory of 2852 2076 omsecor.exe 33 PID 2076 wrote to memory of 2852 2076 omsecor.exe 33 PID 2076 wrote to memory of 2852 2076 omsecor.exe 33 PID 2852 wrote to memory of 2868 2852 omsecor.exe 35 PID 2852 wrote to memory of 2868 2852 omsecor.exe 35 PID 2852 wrote to memory of 2868 2852 omsecor.exe 35 PID 2852 wrote to memory of 2868 2852 omsecor.exe 35 PID 2868 wrote to memory of 1612 2868 omsecor.exe 36 PID 2868 wrote to memory of 1612 2868 omsecor.exe 36 PID 2868 wrote to memory of 1612 2868 omsecor.exe 36 PID 2868 wrote to memory of 1612 2868 omsecor.exe 36 PID 2868 wrote to memory of 1612 2868 omsecor.exe 36 PID 2868 wrote to memory of 1612 2868 omsecor.exe 36 PID 1612 wrote to memory of 1948 1612 omsecor.exe 37 PID 1612 wrote to memory of 1948 1612 omsecor.exe 37 PID 1612 wrote to memory of 1948 1612 omsecor.exe 37 PID 1612 wrote to memory of 1948 1612 omsecor.exe 37 PID 1948 wrote to memory of 2920 1948 omsecor.exe 38 PID 1948 wrote to memory of 2920 1948 omsecor.exe 38 PID 1948 wrote to memory of 2920 1948 omsecor.exe 38 PID 1948 wrote to memory of 2920 1948 omsecor.exe 38 PID 1948 wrote to memory of 2920 1948 omsecor.exe 38 PID 1948 wrote to memory of 2920 1948 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe"C:\Users\Admin\AppData\Local\Temp\dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exeC:\Users\Admin\AppData\Local\Temp\dd397e4bfb6917e97f317cf291b601fb7dfad59cc4bf77077ec503caa7ba9a98N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b4149a7ebc97f13f2d9b920353ffebb6
SHA1f8d8f620d32aca0e1640b7f5be7e50805cfea090
SHA256e9ca927468c22be15bc83132fc53f33d838c001a26ecaf3ef01b83a13ca195bf
SHA5128e4e2647acf719d47620e6c5b8eed202fdb10c4da2f9a770d70338ed7ec8f0cc49fd5e89a81418835f202b939889e3853e1f5dbce7dbb132c684dbba5e8b3353
-
Filesize
96KB
MD5ec5b326f60daaa45a29228d260643d03
SHA1c6166343cd2ec940535de25f45632133f3243731
SHA2565164cf44259b7353617d29af0067752492f55f11a3519dd704dc8b1dfc9e2988
SHA512000305f9db973812ebeae800490c95fac457d7605f8c70fffd3d32f5036e6e631e04c7eddea642bf9c1f21af014792d9cd9bd5a7b1bab0b4675eca689a508e0e
-
Filesize
96KB
MD51c7443a4d3dc3d84a1b4fe71fd3887e6
SHA164a38c8ac030317b20517803dd7956c8b381bd08
SHA2565f29ab7fec6c0c1181c85fe63746aa6c3bbe27834277fe37b7b59102f3e593bb
SHA512e2594f04856c9fbd1f06104115e80c1929f8c3fca69ccb535fa584fe142c02661c299c9df4131477dcfab207c7d0ae71c0af7f63cb7673fc5434b9cb6a1ca69d