Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe
Resource
win7-20240708-en
General
-
Target
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe
-
Size
96KB
-
MD5
2b2f1a8dcbdd5424b1c500e52c1ebd35
-
SHA1
42f0ea77ee3856290e1ea135265579eb72809ee9
-
SHA256
4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f
-
SHA512
883254e887e1e9936d2e53f410c4ad26356c81acc97c6c4ac964c8fcdeb86a37e5a45a39446440096aaf01b619a6d99591278d3c894fd35874252fcfe0848869
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:TGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2152 omsecor.exe 2988 omsecor.exe 2672 omsecor.exe 2400 omsecor.exe 1944 omsecor.exe 2348 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2684 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 2684 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 2152 omsecor.exe 2988 omsecor.exe 2988 omsecor.exe 2400 omsecor.exe 2400 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1728 set thread context of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 2152 set thread context of 2988 2152 omsecor.exe 32 PID 2672 set thread context of 2400 2672 omsecor.exe 36 PID 1944 set thread context of 2348 1944 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 1728 wrote to memory of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 1728 wrote to memory of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 1728 wrote to memory of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 1728 wrote to memory of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 1728 wrote to memory of 2684 1728 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 30 PID 2684 wrote to memory of 2152 2684 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 31 PID 2684 wrote to memory of 2152 2684 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 31 PID 2684 wrote to memory of 2152 2684 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 31 PID 2684 wrote to memory of 2152 2684 4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe 31 PID 2152 wrote to memory of 2988 2152 omsecor.exe 32 PID 2152 wrote to memory of 2988 2152 omsecor.exe 32 PID 2152 wrote to memory of 2988 2152 omsecor.exe 32 PID 2152 wrote to memory of 2988 2152 omsecor.exe 32 PID 2152 wrote to memory of 2988 2152 omsecor.exe 32 PID 2152 wrote to memory of 2988 2152 omsecor.exe 32 PID 2988 wrote to memory of 2672 2988 omsecor.exe 35 PID 2988 wrote to memory of 2672 2988 omsecor.exe 35 PID 2988 wrote to memory of 2672 2988 omsecor.exe 35 PID 2988 wrote to memory of 2672 2988 omsecor.exe 35 PID 2672 wrote to memory of 2400 2672 omsecor.exe 36 PID 2672 wrote to memory of 2400 2672 omsecor.exe 36 PID 2672 wrote to memory of 2400 2672 omsecor.exe 36 PID 2672 wrote to memory of 2400 2672 omsecor.exe 36 PID 2672 wrote to memory of 2400 2672 omsecor.exe 36 PID 2672 wrote to memory of 2400 2672 omsecor.exe 36 PID 2400 wrote to memory of 1944 2400 omsecor.exe 37 PID 2400 wrote to memory of 1944 2400 omsecor.exe 37 PID 2400 wrote to memory of 1944 2400 omsecor.exe 37 PID 2400 wrote to memory of 1944 2400 omsecor.exe 37 PID 1944 wrote to memory of 2348 1944 omsecor.exe 38 PID 1944 wrote to memory of 2348 1944 omsecor.exe 38 PID 1944 wrote to memory of 2348 1944 omsecor.exe 38 PID 1944 wrote to memory of 2348 1944 omsecor.exe 38 PID 1944 wrote to memory of 2348 1944 omsecor.exe 38 PID 1944 wrote to memory of 2348 1944 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe"C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exeC:\Users\Admin\AppData\Local\Temp\4648782cab176f6795e5856774ee7c7f127985ded978f02cd217b5829b29be8f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2348
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f4989a14da464272f323b9fba28621b4
SHA1553fb924e83a6367b6b9c74a33c88956ea6e4d4b
SHA2563ad8bdab1d791cd4fd15bedab1d3353fb2fff6653417afcfea5a64a2d944326c
SHA512fb9cb80bdd70a34768966a94918f97d96fd1cddcb87719b214466b83fcc313e83e528595e4038a5252b819775639f5efd41ec1b1abf1aa7a65497b84bb5e55b0
-
Filesize
96KB
MD5e6792a8c400e120b37b888acdffb72c6
SHA11f87b9d12a8b287d1aacd0fcda7397efef443a11
SHA256a2ee2dab8c7c085773632d0918192ca964d3d39556e58baa610704b5992fd2b4
SHA512961a8e83884e9392b74aaa060760be3ed32921b6a59e2113f1a92feaa814f360921bfad201cebb3a1940a9b6d33299d4a99beab0e97d4a64a30ea032d7917b07
-
Filesize
96KB
MD5114a1b3e93d7155a34d1b8e6097ad03d
SHA118d703176574e00770ff80b532008f1f4641b40f
SHA2560a4e5f4e91bc19c34f41d76853e28f93b2e799ff462ef2c88021f54890b90619
SHA512bbbe2329b27cede3d33f79764e9150a987e4f9a453945ff9bf4e86b096407483351277900c7ce91ada785113603b4e8de9ce721b3f369b1e5596db3f233fdf12