Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 08:56
Static task
static1
Behavioral task
behavioral1
Sample
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe
Resource
win7-20240708-en
General
-
Target
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe
-
Size
96KB
-
MD5
c5d27f97b4a50dc6a13f45a8ed2a9476
-
SHA1
dc06bb72c634658d7347009688980b841a8b4899
-
SHA256
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014
-
SHA512
653aabd8a7cf34d9c1f9861152b805d5bb5d2dff119dbb2edcff36784d71055ff4e33de19909e484b41cf96bb7e3b3158e9d9f6726cd923f5194cce4050cbf57
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:ZGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2832 omsecor.exe 2456 omsecor.exe 2308 omsecor.exe 1380 omsecor.exe 852 omsecor.exe 2860 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2988 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 2988 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 2832 omsecor.exe 2456 omsecor.exe 2456 omsecor.exe 1380 omsecor.exe 1380 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2976 set thread context of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2832 set thread context of 2456 2832 omsecor.exe 32 PID 2308 set thread context of 1380 2308 omsecor.exe 36 PID 852 set thread context of 2860 852 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2976 wrote to memory of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2976 wrote to memory of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2976 wrote to memory of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2976 wrote to memory of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2976 wrote to memory of 2988 2976 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 30 PID 2988 wrote to memory of 2832 2988 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2988 wrote to memory of 2832 2988 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2988 wrote to memory of 2832 2988 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2988 wrote to memory of 2832 2988 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2832 wrote to memory of 2456 2832 omsecor.exe 32 PID 2832 wrote to memory of 2456 2832 omsecor.exe 32 PID 2832 wrote to memory of 2456 2832 omsecor.exe 32 PID 2832 wrote to memory of 2456 2832 omsecor.exe 32 PID 2832 wrote to memory of 2456 2832 omsecor.exe 32 PID 2832 wrote to memory of 2456 2832 omsecor.exe 32 PID 2456 wrote to memory of 2308 2456 omsecor.exe 35 PID 2456 wrote to memory of 2308 2456 omsecor.exe 35 PID 2456 wrote to memory of 2308 2456 omsecor.exe 35 PID 2456 wrote to memory of 2308 2456 omsecor.exe 35 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 2308 wrote to memory of 1380 2308 omsecor.exe 36 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 1380 wrote to memory of 852 1380 omsecor.exe 37 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38 PID 852 wrote to memory of 2860 852 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe"C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exeC:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD576a463c29386e5e016674ab429d6ab87
SHA1fafc3605f3e8cde84f86429063fd2c242b744b6e
SHA2569a9e4e81ec8b36ce09cb5595d78a45af9c5dfec692348a8918f6f48285a7f1bc
SHA5127528f2143a37f83e399a0a41d5f09a0f4c866d78ef2ee8d3a2fb642497caddd663b89766e69696e07f4fd6dc44a5d85b537a70472a17bbd8e0ade856173b31d9
-
Filesize
96KB
MD5473b644f2d7b1609b8d47a04cc6185c2
SHA127adaa6a2ca563def9c04e5a2ec9e9a2ac2747fc
SHA2565eda06b0d9024e920c358b9997148c9b79425d7d849342b3d355babc75b8139d
SHA512b99ec001681e9d26daf7ce1786273875c43b8e266970f659f98881cad41e768a8a3a25b22a16fc14501925f4295df51e236cfcc88b0be11458b583bfc307470c
-
Filesize
96KB
MD5e23fcf6d5f1fbb6907b58a7aa2defb37
SHA18b2ec1ebe0d0885eaa57c6cef4215acf8206c0ed
SHA256f9a4a9b83010a85e5f6c8393a2bf2f834c13b614b6a9e2f395ec89e3093ce2fb
SHA51247e0be228a543380558ccca32c7b33c7e03550b20e0d1065c3b01c1805466802fcfd26a84619cb19b65d983a24140d8f2e5c65021e1a44fa93ab00e09aca26a1