Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe
Resource
win7-20240903-en
General
-
Target
6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe
-
Size
96KB
-
MD5
0eab4d97804a75be8a67c5423e3f8810
-
SHA1
9098c6d913d65a869e62fd630aa7e91736b26f12
-
SHA256
6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1
-
SHA512
9236120c3a6c6602d5e266c4150c8a4398f4e1a5778332a353c84edcf1fe1a4cae9cd82ff0d93171a514666bf275f16928412822816e83523cf1ea3bbb5fdca3
-
SSDEEP
1536:+nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:+Gs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2316 omsecor.exe 1124 omsecor.exe 2112 omsecor.exe 1944 omsecor.exe 2636 omsecor.exe 1776 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2496 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 2496 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 2316 omsecor.exe 1124 omsecor.exe 1124 omsecor.exe 1944 omsecor.exe 1944 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2524 set thread context of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2316 set thread context of 1124 2316 omsecor.exe 32 PID 2112 set thread context of 1944 2112 omsecor.exe 36 PID 2636 set thread context of 1776 2636 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2524 wrote to memory of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2524 wrote to memory of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2524 wrote to memory of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2524 wrote to memory of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2524 wrote to memory of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2524 wrote to memory of 2496 2524 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 30 PID 2496 wrote to memory of 2316 2496 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 31 PID 2496 wrote to memory of 2316 2496 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 31 PID 2496 wrote to memory of 2316 2496 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 31 PID 2496 wrote to memory of 2316 2496 6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe 31 PID 2316 wrote to memory of 1124 2316 omsecor.exe 32 PID 2316 wrote to memory of 1124 2316 omsecor.exe 32 PID 2316 wrote to memory of 1124 2316 omsecor.exe 32 PID 2316 wrote to memory of 1124 2316 omsecor.exe 32 PID 2316 wrote to memory of 1124 2316 omsecor.exe 32 PID 2316 wrote to memory of 1124 2316 omsecor.exe 32 PID 1124 wrote to memory of 2112 1124 omsecor.exe 35 PID 1124 wrote to memory of 2112 1124 omsecor.exe 35 PID 1124 wrote to memory of 2112 1124 omsecor.exe 35 PID 1124 wrote to memory of 2112 1124 omsecor.exe 35 PID 2112 wrote to memory of 1944 2112 omsecor.exe 36 PID 2112 wrote to memory of 1944 2112 omsecor.exe 36 PID 2112 wrote to memory of 1944 2112 omsecor.exe 36 PID 2112 wrote to memory of 1944 2112 omsecor.exe 36 PID 2112 wrote to memory of 1944 2112 omsecor.exe 36 PID 2112 wrote to memory of 1944 2112 omsecor.exe 36 PID 1944 wrote to memory of 2636 1944 omsecor.exe 37 PID 1944 wrote to memory of 2636 1944 omsecor.exe 37 PID 1944 wrote to memory of 2636 1944 omsecor.exe 37 PID 1944 wrote to memory of 2636 1944 omsecor.exe 37 PID 2636 wrote to memory of 1776 2636 omsecor.exe 38 PID 2636 wrote to memory of 1776 2636 omsecor.exe 38 PID 2636 wrote to memory of 1776 2636 omsecor.exe 38 PID 2636 wrote to memory of 1776 2636 omsecor.exe 38 PID 2636 wrote to memory of 1776 2636 omsecor.exe 38 PID 2636 wrote to memory of 1776 2636 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe"C:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exeC:\Users\Admin\AppData\Local\Temp\6cdf92158d7e53d6a52432c399aaf8a174cb9db6b14eb23780d8702a28a49ae1N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56f456f4cd9b8d9c35f7a567fb0ba2a01
SHA108a8f335c10969487b4f78b03ed4cc324bb637ed
SHA25641db6943310bd959877ba0d76d8a6be5f38ecc1bebb7cf0c1ddb495a0abebad5
SHA51270a1b97788ff7cd4a296b95a50e1de34273eba9ff519041a5089477530f1843ec41bd2b168dc2aa174d9d45e9db0fb842e557ab66bf376a8aed7447e890835c9
-
Filesize
96KB
MD5ddbe628d698e6d7b563082ba6c1c00b4
SHA1e3b216aaf878572c42e76af303c8312976159a21
SHA25663a16a753d6587c92a5363f649caddc0cb1e57e44dd7190f0073bc5ffac0b09e
SHA51215083ab45b09dba62ff13c8eaa5d9732ea0b0af1cac7b82a6054e4cb987cb5be5e1437bfe18ae45c625a4bd29da044bbf0e3d94041bce103caf19f9ed149b575
-
Filesize
96KB
MD5f6ae5fc2ed27f4cbdad180cbe6e1484d
SHA1a082d0d72ebc5b79989d38ba259c263931a19c57
SHA256d4b9ea96f480165a8d8ee60c6fed67c4de41168b4e62e6976ccaed9e7fc2d2ea
SHA512c86505391ca9239539122c689004ff74ea685d1f073b46f2bf31b5c87b0ce192a46c562058a3d1bcfbe3bdb52fb89bee2601b355d921bd2b85e4d934361091e7