Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 03:32
Static task
static1
Behavioral task
behavioral1
Sample
0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe
Resource
win7-20240903-en
General
-
Target
0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe
-
Size
96KB
-
MD5
be095d6a35f74016d38c678c56c1db7c
-
SHA1
737a8686c0a9931aba32241d56ec241ee57b65d6
-
SHA256
0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab
-
SHA512
75d2a3e581cf119ca9e33725c6ebc0e515b2f14e1a27d64d47ed7c4bec71b50cfb5587843dec40b938af8a562aa42eaa198a915cc22eabdbc84e68f9033d5a89
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxR:zGs8cd8eXlYairZYqMddH13R
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2568 omsecor.exe 2524 omsecor.exe 1896 omsecor.exe 1872 omsecor.exe 1008 omsecor.exe 2396 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2508 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 2508 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 2568 omsecor.exe 2524 omsecor.exe 2524 omsecor.exe 1872 omsecor.exe 1872 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1624 set thread context of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 2568 set thread context of 2524 2568 omsecor.exe 31 PID 1896 set thread context of 1872 1896 omsecor.exe 34 PID 1008 set thread context of 2396 1008 omsecor.exe 36 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 1624 wrote to memory of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 1624 wrote to memory of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 1624 wrote to memory of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 1624 wrote to memory of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 1624 wrote to memory of 2508 1624 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 29 PID 2508 wrote to memory of 2568 2508 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 30 PID 2508 wrote to memory of 2568 2508 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 30 PID 2508 wrote to memory of 2568 2508 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 30 PID 2508 wrote to memory of 2568 2508 0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe 30 PID 2568 wrote to memory of 2524 2568 omsecor.exe 31 PID 2568 wrote to memory of 2524 2568 omsecor.exe 31 PID 2568 wrote to memory of 2524 2568 omsecor.exe 31 PID 2568 wrote to memory of 2524 2568 omsecor.exe 31 PID 2568 wrote to memory of 2524 2568 omsecor.exe 31 PID 2568 wrote to memory of 2524 2568 omsecor.exe 31 PID 2524 wrote to memory of 1896 2524 omsecor.exe 33 PID 2524 wrote to memory of 1896 2524 omsecor.exe 33 PID 2524 wrote to memory of 1896 2524 omsecor.exe 33 PID 2524 wrote to memory of 1896 2524 omsecor.exe 33 PID 1896 wrote to memory of 1872 1896 omsecor.exe 34 PID 1896 wrote to memory of 1872 1896 omsecor.exe 34 PID 1896 wrote to memory of 1872 1896 omsecor.exe 34 PID 1896 wrote to memory of 1872 1896 omsecor.exe 34 PID 1896 wrote to memory of 1872 1896 omsecor.exe 34 PID 1896 wrote to memory of 1872 1896 omsecor.exe 34 PID 1872 wrote to memory of 1008 1872 omsecor.exe 35 PID 1872 wrote to memory of 1008 1872 omsecor.exe 35 PID 1872 wrote to memory of 1008 1872 omsecor.exe 35 PID 1872 wrote to memory of 1008 1872 omsecor.exe 35 PID 1008 wrote to memory of 2396 1008 omsecor.exe 36 PID 1008 wrote to memory of 2396 1008 omsecor.exe 36 PID 1008 wrote to memory of 2396 1008 omsecor.exe 36 PID 1008 wrote to memory of 2396 1008 omsecor.exe 36 PID 1008 wrote to memory of 2396 1008 omsecor.exe 36 PID 1008 wrote to memory of 2396 1008 omsecor.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe"C:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exeC:\Users\Admin\AppData\Local\Temp\0b6470481c45cd4a6249392fd7883a7f56903f5acc179067b143c9e181f3e5ab.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58766871e47011bee6ec6dec3193741a0
SHA10fb04f25369575960bb634b776f42d4dc6d7914e
SHA256b61b3f7d095a87c9946218e78d00dd161da519a84ce22ccfabf6abe8cb56d996
SHA51268aa93db351cac8010d5dc2dbe79274ef092dbe7521afe21173e31b3515270407f13343f67502691275f25c29cb2782ce18c990bc96b7de52b2cadcee41fd909
-
Filesize
96KB
MD5062577c16e8524c137335d27e8bef01d
SHA1d8ca97461398dc820563246071d2ffd0cc1cae07
SHA2564511b8a95a8e8c1dd8867dc7bf31f6e0fc0e34d537c7ebdc0e9e576e016df1d1
SHA512da6c9750f45a59d538d119aa880a6e31f16b752fd39a98b229cde6629b4d22dc3e7bacac4defe78a400b8628bf34568821f06beb081659c877988acb2c31726d
-
Filesize
96KB
MD548c577eb7136fde27f471f2f5ac0292d
SHA138d219572e994b4ea886f8e2f96e81e6f90707b3
SHA2568fef54420003697fed59f91f6bfb47422ed5bf08d2b01ca56c09542152718fb6
SHA51220b853a02a0805a3b481bf5da5c2b8b7874f7f0c089a9213258474be91c4a8050381dd9ccb058120287532fc5c53db9843935e09b3eee9894656d6c800a2bd02