Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe
Resource
win7-20240903-en
General
-
Target
53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe
-
Size
96KB
-
MD5
7a1f296dd107b7200ebce0ab57a125f0
-
SHA1
b47b2496d02dec987babb68206da19aeb3f2ae62
-
SHA256
53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11ed
-
SHA512
920ac4be7a4b5802a8cf31653963a6d0eda57b11daa05907f405975497b2cd4d73278151ac62b4a025757412beec9e31af118ea892f7b7ed16ae6e42ee7b7221
-
SSDEEP
1536:TnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:TGs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2176 omsecor.exe 1648 omsecor.exe 2320 omsecor.exe 2696 omsecor.exe 896 omsecor.exe 3068 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2112 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 2112 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 2176 omsecor.exe 1648 omsecor.exe 1648 omsecor.exe 2696 omsecor.exe 2696 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2116 set thread context of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2176 set thread context of 1648 2176 omsecor.exe 32 PID 2320 set thread context of 2696 2320 omsecor.exe 36 PID 896 set thread context of 3068 896 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2116 wrote to memory of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2116 wrote to memory of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2116 wrote to memory of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2116 wrote to memory of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2116 wrote to memory of 2112 2116 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 30 PID 2112 wrote to memory of 2176 2112 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 31 PID 2112 wrote to memory of 2176 2112 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 31 PID 2112 wrote to memory of 2176 2112 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 31 PID 2112 wrote to memory of 2176 2112 53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe 31 PID 2176 wrote to memory of 1648 2176 omsecor.exe 32 PID 2176 wrote to memory of 1648 2176 omsecor.exe 32 PID 2176 wrote to memory of 1648 2176 omsecor.exe 32 PID 2176 wrote to memory of 1648 2176 omsecor.exe 32 PID 2176 wrote to memory of 1648 2176 omsecor.exe 32 PID 2176 wrote to memory of 1648 2176 omsecor.exe 32 PID 1648 wrote to memory of 2320 1648 omsecor.exe 35 PID 1648 wrote to memory of 2320 1648 omsecor.exe 35 PID 1648 wrote to memory of 2320 1648 omsecor.exe 35 PID 1648 wrote to memory of 2320 1648 omsecor.exe 35 PID 2320 wrote to memory of 2696 2320 omsecor.exe 36 PID 2320 wrote to memory of 2696 2320 omsecor.exe 36 PID 2320 wrote to memory of 2696 2320 omsecor.exe 36 PID 2320 wrote to memory of 2696 2320 omsecor.exe 36 PID 2320 wrote to memory of 2696 2320 omsecor.exe 36 PID 2320 wrote to memory of 2696 2320 omsecor.exe 36 PID 2696 wrote to memory of 896 2696 omsecor.exe 37 PID 2696 wrote to memory of 896 2696 omsecor.exe 37 PID 2696 wrote to memory of 896 2696 omsecor.exe 37 PID 2696 wrote to memory of 896 2696 omsecor.exe 37 PID 896 wrote to memory of 3068 896 omsecor.exe 38 PID 896 wrote to memory of 3068 896 omsecor.exe 38 PID 896 wrote to memory of 3068 896 omsecor.exe 38 PID 896 wrote to memory of 3068 896 omsecor.exe 38 PID 896 wrote to memory of 3068 896 omsecor.exe 38 PID 896 wrote to memory of 3068 896 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe"C:\Users\Admin\AppData\Local\Temp\53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exeC:\Users\Admin\AppData\Local\Temp\53830929eb3f46fd39cbc200c7702d44b7234d097b0886b165880c79bd1b11edN.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD58b8b2dee2d980b81b871b4bd0314a504
SHA116d65f7d3527f6b89d6e8363292cf84032c28af1
SHA256738284f7ec1294dec8225db58d36017656eec963ae29c259372109f1d7de8b81
SHA51202ef169de0d64404856ddab96594b01a787b2e6a2298656feef4ec9a93fc522fd0642cccfef926e0ac2b6aff745b4a60498e5c0f65f3fb54eec1e54c545500c4
-
Filesize
96KB
MD57a8e86b1cf932a1e3fe7419020fcbba6
SHA14dd9a93c786456c91a341a072e052651ab1ea046
SHA256750ee92ded893cd1cfacfff1fe61d8eefa3d099e0860810591141eb47c7f8be3
SHA512d17168691477cd3f4cac922114cc217e9e69c449866b7c8ee3be742bbb8bfa7382db55f0684b1bccc40b25a3b4a71397cde3d55bb8e5ab01bb939f27f47ff054
-
Filesize
96KB
MD5e18db53254125d6f27488b5d9950d5e3
SHA1dd3e09a9499dce0a7aa2990852e3b63827b6cab5
SHA256e76a15f72d7392d69bdec6ea48246a0c2cd83e35e7bd4bec93979e2481b571ea
SHA512944f0375276d2779459293f9bc724dd3ea6e67175324ec52662d7e33ab4f074ab8842819846011fffcbf7c379d175048e60cac56a9e521c713645f25329ec8fb