Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe
Resource
win7-20240708-en
General
-
Target
d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe
-
Size
134KB
-
MD5
9bb596eea25fc55790d229ed50b29481
-
SHA1
57169066a43d6507ec26ebde318bc1b6bcf28da8
-
SHA256
d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b
-
SHA512
c78c20b30b663cfa9c4c99ba0ceed1358a58dba669cc1d6bdc15e4745b7a0900306d35d40b3cb9117bbfd100230a32e53f2fd519e5626e9355422a5f1cee6a88
-
SSDEEP
1536:sDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiN:SiRTeH0iqAW6J6f1tqF6dngNmaZCiaS
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1848 omsecor.exe 2344 omsecor.exe 1988 omsecor.exe 1948 omsecor.exe 2016 omsecor.exe 2524 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2520 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 2520 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 1848 omsecor.exe 2344 omsecor.exe 2344 omsecor.exe 1948 omsecor.exe 1948 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1920 set thread context of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 1848 set thread context of 2344 1848 omsecor.exe 32 PID 1988 set thread context of 1948 1988 omsecor.exe 36 PID 2016 set thread context of 2524 2016 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 1920 wrote to memory of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 1920 wrote to memory of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 1920 wrote to memory of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 1920 wrote to memory of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 1920 wrote to memory of 2520 1920 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 30 PID 2520 wrote to memory of 1848 2520 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 31 PID 2520 wrote to memory of 1848 2520 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 31 PID 2520 wrote to memory of 1848 2520 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 31 PID 2520 wrote to memory of 1848 2520 d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe 31 PID 1848 wrote to memory of 2344 1848 omsecor.exe 32 PID 1848 wrote to memory of 2344 1848 omsecor.exe 32 PID 1848 wrote to memory of 2344 1848 omsecor.exe 32 PID 1848 wrote to memory of 2344 1848 omsecor.exe 32 PID 1848 wrote to memory of 2344 1848 omsecor.exe 32 PID 1848 wrote to memory of 2344 1848 omsecor.exe 32 PID 2344 wrote to memory of 1988 2344 omsecor.exe 35 PID 2344 wrote to memory of 1988 2344 omsecor.exe 35 PID 2344 wrote to memory of 1988 2344 omsecor.exe 35 PID 2344 wrote to memory of 1988 2344 omsecor.exe 35 PID 1988 wrote to memory of 1948 1988 omsecor.exe 36 PID 1988 wrote to memory of 1948 1988 omsecor.exe 36 PID 1988 wrote to memory of 1948 1988 omsecor.exe 36 PID 1988 wrote to memory of 1948 1988 omsecor.exe 36 PID 1988 wrote to memory of 1948 1988 omsecor.exe 36 PID 1988 wrote to memory of 1948 1988 omsecor.exe 36 PID 1948 wrote to memory of 2016 1948 omsecor.exe 37 PID 1948 wrote to memory of 2016 1948 omsecor.exe 37 PID 1948 wrote to memory of 2016 1948 omsecor.exe 37 PID 1948 wrote to memory of 2016 1948 omsecor.exe 37 PID 2016 wrote to memory of 2524 2016 omsecor.exe 38 PID 2016 wrote to memory of 2524 2016 omsecor.exe 38 PID 2016 wrote to memory of 2524 2016 omsecor.exe 38 PID 2016 wrote to memory of 2524 2016 omsecor.exe 38 PID 2016 wrote to memory of 2524 2016 omsecor.exe 38 PID 2016 wrote to memory of 2524 2016 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe"C:\Users\Admin\AppData\Local\Temp\d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exeC:\Users\Admin\AppData\Local\Temp\d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD540db148d6dd151405a41661e91d79fce
SHA1dba507ddf6ae07adc46039e227b03d6919da8455
SHA2567a67de51e148271bd96ecf326c1a38e6767a23ec641b2b5f06ea40f4e831733e
SHA5124a3b2acee8f80478657243cc2235f8fa0412879bec85a686d93f3c972cbf5758ac3116937ac1c07ad42029ef83587e2df7e0ea7d28df70f35e36f2f14d8ef822
-
Filesize
134KB
MD59bb596eea25fc55790d229ed50b29481
SHA157169066a43d6507ec26ebde318bc1b6bcf28da8
SHA256d49e634d2db2eb0ab24ef7fd095a49b1b00d22bcbcb0e1b0a5ce668c07b9e54b
SHA512c78c20b30b663cfa9c4c99ba0ceed1358a58dba669cc1d6bdc15e4745b7a0900306d35d40b3cb9117bbfd100230a32e53f2fd519e5626e9355422a5f1cee6a88