Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe
Resource
win7-20241010-en
General
-
Target
c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe
-
Size
96KB
-
MD5
416900c00aff107ca4ebcb95c904ab90
-
SHA1
e49f6e08bdec302e5de3e63bd9b7365c0ff9384b
-
SHA256
c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8
-
SHA512
5e315c2a28108a27942d29938de790f21247f968bac7c6230091f58f2342af30cde865e14eb9a3c52db0f14770b10db6854302182180a9208e23542e4485381e
-
SSDEEP
1536:CnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:CGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3008 omsecor.exe 2840 omsecor.exe 2916 omsecor.exe 2492 omsecor.exe 2428 omsecor.exe 2168 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2136 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 2136 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 3008 omsecor.exe 2840 omsecor.exe 2840 omsecor.exe 2492 omsecor.exe 2492 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2828 set thread context of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 3008 set thread context of 2840 3008 omsecor.exe 32 PID 2916 set thread context of 2492 2916 omsecor.exe 36 PID 2428 set thread context of 2168 2428 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2828 wrote to memory of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 2828 wrote to memory of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 2828 wrote to memory of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 2828 wrote to memory of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 2828 wrote to memory of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 2828 wrote to memory of 2136 2828 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 30 PID 2136 wrote to memory of 3008 2136 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 31 PID 2136 wrote to memory of 3008 2136 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 31 PID 2136 wrote to memory of 3008 2136 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 31 PID 2136 wrote to memory of 3008 2136 c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe 31 PID 3008 wrote to memory of 2840 3008 omsecor.exe 32 PID 3008 wrote to memory of 2840 3008 omsecor.exe 32 PID 3008 wrote to memory of 2840 3008 omsecor.exe 32 PID 3008 wrote to memory of 2840 3008 omsecor.exe 32 PID 3008 wrote to memory of 2840 3008 omsecor.exe 32 PID 3008 wrote to memory of 2840 3008 omsecor.exe 32 PID 2840 wrote to memory of 2916 2840 omsecor.exe 35 PID 2840 wrote to memory of 2916 2840 omsecor.exe 35 PID 2840 wrote to memory of 2916 2840 omsecor.exe 35 PID 2840 wrote to memory of 2916 2840 omsecor.exe 35 PID 2916 wrote to memory of 2492 2916 omsecor.exe 36 PID 2916 wrote to memory of 2492 2916 omsecor.exe 36 PID 2916 wrote to memory of 2492 2916 omsecor.exe 36 PID 2916 wrote to memory of 2492 2916 omsecor.exe 36 PID 2916 wrote to memory of 2492 2916 omsecor.exe 36 PID 2916 wrote to memory of 2492 2916 omsecor.exe 36 PID 2492 wrote to memory of 2428 2492 omsecor.exe 37 PID 2492 wrote to memory of 2428 2492 omsecor.exe 37 PID 2492 wrote to memory of 2428 2492 omsecor.exe 37 PID 2492 wrote to memory of 2428 2492 omsecor.exe 37 PID 2428 wrote to memory of 2168 2428 omsecor.exe 38 PID 2428 wrote to memory of 2168 2428 omsecor.exe 38 PID 2428 wrote to memory of 2168 2428 omsecor.exe 38 PID 2428 wrote to memory of 2168 2428 omsecor.exe 38 PID 2428 wrote to memory of 2168 2428 omsecor.exe 38 PID 2428 wrote to memory of 2168 2428 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe"C:\Users\Admin\AppData\Local\Temp\c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exeC:\Users\Admin\AppData\Local\Temp\c8d24857d20b129b9a03b83bef5150bd5463918bfd56b879c1235590bbc2dff8N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ad4498b3a34fbb676b992f4f7be4f974
SHA1f99006b04f785a43fd5d40c7d1659b14492c2190
SHA256bc7d4b2986f6e144c83c070764cf0a909d5c43647ccfc0ce09b2b49ed7ee89ad
SHA512bce13d6ef5fd78c7b740182b9e5674a296953a0116f6615a9f9db913fe5975ee80ccdbc1c59baaa6767fb9553a11a51992f586c7e3c51319e5c7c814221ff35d
-
Filesize
96KB
MD5bc4c75166543a6295515a9284eace533
SHA1afba59cdde3fad6255c6f3d221474db621c092a8
SHA25604d43d14a76c90510d3d14c57c6ca32aea1f6ad2a361bad5ba40cf1fc1486216
SHA5129370d803393a7d98690fe3820118d56b6dedd9b7420a81745adc29d2d29b112d2c92dd1fa08f60f745d5823872d6ce4e01a223836030c20ae74ae05d2a0015be
-
Filesize
96KB
MD57709c89276efaa8a53f6257b40e68d8d
SHA1f28dc740eb7810c7a76a1e086898203246156e17
SHA256e0979542a524c69571ebfd9d097e6ce0b5f931962832eec307dea9d86928bd9f
SHA512e4e4af96545860d34c31143143a72464172a71eb7c54cd6ef5368d61ff69a21c987551a56a532919d13b3466afd13dd83b701f14269ce274df58d6bf437d7bff