Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe
Resource
win7-20240903-en
General
-
Target
b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe
-
Size
96KB
-
MD5
17f0de6dbf2844af1cf0c355ddab6552
-
SHA1
a6fb2c6b1b25345237a3e58ec9163224803d0ba4
-
SHA256
b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951
-
SHA512
7788b17e1ea8236fd5400db1cea4b367d2a8c5e5e54ab99e7669ac9f89fa2e002c353589971cc888a082470d3e8d753c441598c60895e2568be6c229a4f0d68d
-
SSDEEP
1536:anAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:aGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2756 omsecor.exe 2736 omsecor.exe 1940 omsecor.exe 1996 omsecor.exe 2004 omsecor.exe 1864 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2988 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 2988 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 2756 omsecor.exe 2736 omsecor.exe 2736 omsecor.exe 1996 omsecor.exe 1996 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2192 set thread context of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2756 set thread context of 2736 2756 omsecor.exe 30 PID 1940 set thread context of 1996 1940 omsecor.exe 35 PID 2004 set thread context of 1864 2004 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2192 wrote to memory of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2192 wrote to memory of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2192 wrote to memory of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2192 wrote to memory of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2192 wrote to memory of 2988 2192 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 28 PID 2988 wrote to memory of 2756 2988 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 29 PID 2988 wrote to memory of 2756 2988 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 29 PID 2988 wrote to memory of 2756 2988 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 29 PID 2988 wrote to memory of 2756 2988 b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe 29 PID 2756 wrote to memory of 2736 2756 omsecor.exe 30 PID 2756 wrote to memory of 2736 2756 omsecor.exe 30 PID 2756 wrote to memory of 2736 2756 omsecor.exe 30 PID 2756 wrote to memory of 2736 2756 omsecor.exe 30 PID 2756 wrote to memory of 2736 2756 omsecor.exe 30 PID 2756 wrote to memory of 2736 2756 omsecor.exe 30 PID 2736 wrote to memory of 1940 2736 omsecor.exe 34 PID 2736 wrote to memory of 1940 2736 omsecor.exe 34 PID 2736 wrote to memory of 1940 2736 omsecor.exe 34 PID 2736 wrote to memory of 1940 2736 omsecor.exe 34 PID 1940 wrote to memory of 1996 1940 omsecor.exe 35 PID 1940 wrote to memory of 1996 1940 omsecor.exe 35 PID 1940 wrote to memory of 1996 1940 omsecor.exe 35 PID 1940 wrote to memory of 1996 1940 omsecor.exe 35 PID 1940 wrote to memory of 1996 1940 omsecor.exe 35 PID 1940 wrote to memory of 1996 1940 omsecor.exe 35 PID 1996 wrote to memory of 2004 1996 omsecor.exe 36 PID 1996 wrote to memory of 2004 1996 omsecor.exe 36 PID 1996 wrote to memory of 2004 1996 omsecor.exe 36 PID 1996 wrote to memory of 2004 1996 omsecor.exe 36 PID 2004 wrote to memory of 1864 2004 omsecor.exe 37 PID 2004 wrote to memory of 1864 2004 omsecor.exe 37 PID 2004 wrote to memory of 1864 2004 omsecor.exe 37 PID 2004 wrote to memory of 1864 2004 omsecor.exe 37 PID 2004 wrote to memory of 1864 2004 omsecor.exe 37 PID 2004 wrote to memory of 1864 2004 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe"C:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exeC:\Users\Admin\AppData\Local\Temp\b9b498eabd4d374a02c4c5893a1a6c09b6e2a29ec3bc7b78a72b9169b6c6c951.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c83ddba5c2c33d99e260365e37e3820f
SHA1c4e45a1b5529bf3a9cf321ba1df841128d6640be
SHA256c050ba5b693195343f20f7136f5b733030b87db476a8090f2c84019b4aebab85
SHA512465aacdf2b26bed90c3f351270ddc7746e82ed24a34a34a74088ca05000660f339c21237142662439e7452a064adc3ca69d786d0abb649f49e9f399d7d4bcf49
-
Filesize
96KB
MD5f3550972497725cfa0093ce004538eb9
SHA18f7f4460ffcd0be50fe9b8966f5f199b0719f54c
SHA25612f1c250b52f219f4e97cefa15a57addfc978926f7bb345f8bffad7442c20b8c
SHA51295fa520f0677ebbd3a924dcd56b4594b2064461020fbbbd6ed52a93ac02b1f4d6a77761d779e3e32d89c648be50301cdfafdfc787eabc63461bd0bcb77f217f0
-
Filesize
96KB
MD5b6244a1e7736218448e9e03e860f3dcc
SHA16ae3d1a44bae518f9c9e7cfc7f53a6f1b104803e
SHA256c38e10e51d58441c15cb3bb391baef1fbd01b45f2e26cbe01ee99332dd5b5556
SHA512b2524e9ec12986f513ba10daba2c2fb194d0305f6e5d531b9879204d75edf23c58cf46cb0f0ec8bcbe058d4ed8aecb572887307bac6f779b6c2311aa432bf51a