Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
Resource
win7-20240903-en
General
-
Target
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
-
Size
96KB
-
MD5
368d064efacaaa20abc57a01c83e0f3e
-
SHA1
2f0a36ebc6e185071605afa653ad3da504d4df62
-
SHA256
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e
-
SHA512
641a4ac039b2cb409b615069c1874a004e0f0da2e4a69937bd176a089c12b1960597afb12bb10b0f218ecc126cf85ad53a5ae4f099844ab316e3d43c20f172c9
-
SSDEEP
1536:+nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:+Gs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2384 omsecor.exe 2964 omsecor.exe 2028 omsecor.exe 1696 omsecor.exe 832 omsecor.exe 1580 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2260 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 2260 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 2384 omsecor.exe 2964 omsecor.exe 2964 omsecor.exe 1696 omsecor.exe 1696 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2440 set thread context of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2384 set thread context of 2964 2384 omsecor.exe 32 PID 2028 set thread context of 1696 2028 omsecor.exe 36 PID 832 set thread context of 1580 832 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2440 wrote to memory of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2440 wrote to memory of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2440 wrote to memory of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2440 wrote to memory of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2440 wrote to memory of 2260 2440 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 30 PID 2260 wrote to memory of 2384 2260 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 2260 wrote to memory of 2384 2260 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 2260 wrote to memory of 2384 2260 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 2260 wrote to memory of 2384 2260 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 2384 wrote to memory of 2964 2384 omsecor.exe 32 PID 2384 wrote to memory of 2964 2384 omsecor.exe 32 PID 2384 wrote to memory of 2964 2384 omsecor.exe 32 PID 2384 wrote to memory of 2964 2384 omsecor.exe 32 PID 2384 wrote to memory of 2964 2384 omsecor.exe 32 PID 2384 wrote to memory of 2964 2384 omsecor.exe 32 PID 2964 wrote to memory of 2028 2964 omsecor.exe 35 PID 2964 wrote to memory of 2028 2964 omsecor.exe 35 PID 2964 wrote to memory of 2028 2964 omsecor.exe 35 PID 2964 wrote to memory of 2028 2964 omsecor.exe 35 PID 2028 wrote to memory of 1696 2028 omsecor.exe 36 PID 2028 wrote to memory of 1696 2028 omsecor.exe 36 PID 2028 wrote to memory of 1696 2028 omsecor.exe 36 PID 2028 wrote to memory of 1696 2028 omsecor.exe 36 PID 2028 wrote to memory of 1696 2028 omsecor.exe 36 PID 2028 wrote to memory of 1696 2028 omsecor.exe 36 PID 1696 wrote to memory of 832 1696 omsecor.exe 37 PID 1696 wrote to memory of 832 1696 omsecor.exe 37 PID 1696 wrote to memory of 832 1696 omsecor.exe 37 PID 1696 wrote to memory of 832 1696 omsecor.exe 37 PID 832 wrote to memory of 1580 832 omsecor.exe 38 PID 832 wrote to memory of 1580 832 omsecor.exe 38 PID 832 wrote to memory of 1580 832 omsecor.exe 38 PID 832 wrote to memory of 1580 832 omsecor.exe 38 PID 832 wrote to memory of 1580 832 omsecor.exe 38 PID 832 wrote to memory of 1580 832 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exeC:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5bf7081c5fb72643cae63538b0128b8b8
SHA1ac3e5ac8e5d58b60740da52458b17c762cd17024
SHA25644ac5aa265f57cf9df83355e6ba0f6dc64f91351229b6ebba9946c514b07347f
SHA5124653a7c3f8c03681f38a52e6bd7c46b2f68b700382e95218e04579f22087ef6473b3cc1c0cef7837fcc3410c9278a5875cafc9867dbfadc9fdd58eda1d4b5711
-
Filesize
96KB
MD5de8e2b68c769139289d790a0cdf3ae7d
SHA161d640c398ae0ddae918c589573aa854726c5d14
SHA256a52b8c200b459d2d110b2e5abf6297f302dea5e879ac746129e0f306c9895c51
SHA512aeabbe1029e6b977de5fb1494bea8c3d8b931086b8e9d3038f5f12e692e711df72f48e76c31c6097f588c28618b4e96a518ae9bbbfe5c32b82495d8789616b10
-
Filesize
96KB
MD5ee055e04b57d25c8b6bc2e2aa16c9115
SHA188b3b39bfcb960aa0c397f4944727896758e8367
SHA2560e6a3281d6bd15d7594a6891e5ff66f8082feb4f3f991b4a41c9cb8191350792
SHA512ca6bca9adab48b2c100e317496b69610a7c82b6eeafb4a8885ea5a0e2c06abc0d1cf95ed98987b189daf7a2415a951d749e0c43c51baa4db73b7bcf7ddaa4807