Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe
Resource
win7-20240708-en
General
-
Target
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe
-
Size
96KB
-
MD5
c5d27f97b4a50dc6a13f45a8ed2a9476
-
SHA1
dc06bb72c634658d7347009688980b841a8b4899
-
SHA256
e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014
-
SHA512
653aabd8a7cf34d9c1f9861152b805d5bb5d2dff119dbb2edcff36784d71055ff4e33de19909e484b41cf96bb7e3b3158e9d9f6726cd923f5194cce4050cbf57
-
SSDEEP
1536:ZnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxj:ZGs8cd8eXlYairZYqMddH13j
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2720 omsecor.exe 2704 omsecor.exe 2088 omsecor.exe 1848 omsecor.exe 320 omsecor.exe 1652 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2160 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 2160 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 2720 omsecor.exe 2704 omsecor.exe 2704 omsecor.exe 1848 omsecor.exe 1848 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2860 set thread context of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2720 set thread context of 2704 2720 omsecor.exe 33 PID 2088 set thread context of 1848 2088 omsecor.exe 36 PID 320 set thread context of 1652 320 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2860 wrote to memory of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2860 wrote to memory of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2860 wrote to memory of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2860 wrote to memory of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2860 wrote to memory of 2160 2860 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 31 PID 2160 wrote to memory of 2720 2160 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 32 PID 2160 wrote to memory of 2720 2160 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 32 PID 2160 wrote to memory of 2720 2160 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 32 PID 2160 wrote to memory of 2720 2160 e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe 32 PID 2720 wrote to memory of 2704 2720 omsecor.exe 33 PID 2720 wrote to memory of 2704 2720 omsecor.exe 33 PID 2720 wrote to memory of 2704 2720 omsecor.exe 33 PID 2720 wrote to memory of 2704 2720 omsecor.exe 33 PID 2720 wrote to memory of 2704 2720 omsecor.exe 33 PID 2720 wrote to memory of 2704 2720 omsecor.exe 33 PID 2704 wrote to memory of 2088 2704 omsecor.exe 35 PID 2704 wrote to memory of 2088 2704 omsecor.exe 35 PID 2704 wrote to memory of 2088 2704 omsecor.exe 35 PID 2704 wrote to memory of 2088 2704 omsecor.exe 35 PID 2088 wrote to memory of 1848 2088 omsecor.exe 36 PID 2088 wrote to memory of 1848 2088 omsecor.exe 36 PID 2088 wrote to memory of 1848 2088 omsecor.exe 36 PID 2088 wrote to memory of 1848 2088 omsecor.exe 36 PID 2088 wrote to memory of 1848 2088 omsecor.exe 36 PID 2088 wrote to memory of 1848 2088 omsecor.exe 36 PID 1848 wrote to memory of 320 1848 omsecor.exe 37 PID 1848 wrote to memory of 320 1848 omsecor.exe 37 PID 1848 wrote to memory of 320 1848 omsecor.exe 37 PID 1848 wrote to memory of 320 1848 omsecor.exe 37 PID 320 wrote to memory of 1652 320 omsecor.exe 38 PID 320 wrote to memory of 1652 320 omsecor.exe 38 PID 320 wrote to memory of 1652 320 omsecor.exe 38 PID 320 wrote to memory of 1652 320 omsecor.exe 38 PID 320 wrote to memory of 1652 320 omsecor.exe 38 PID 320 wrote to memory of 1652 320 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe"C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exeC:\Users\Admin\AppData\Local\Temp\e38756b320f67949bc7b2fc64b6858678e156b43317915b7c782e597f698d014.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55a8e13daf3f47fcfb0b2b30cc2e3c86f
SHA17513063e2bd3313308cc78045cf4807d5a76f335
SHA256e3af1d6d4883a5c35c8ca4000dfd849f0b38cdc3e81d9fad075f38051dbaff2b
SHA512b421949144033f138e72770135f007f65dcae37b4f6ebc770549630c27d01491700163e4eb9bb8f02902f6896655e8b6a00cb1e1c3b02847b9aefbe01e95d556
-
Filesize
96KB
MD576a463c29386e5e016674ab429d6ab87
SHA1fafc3605f3e8cde84f86429063fd2c242b744b6e
SHA2569a9e4e81ec8b36ce09cb5595d78a45af9c5dfec692348a8918f6f48285a7f1bc
SHA5127528f2143a37f83e399a0a41d5f09a0f4c866d78ef2ee8d3a2fb642497caddd663b89766e69696e07f4fd6dc44a5d85b537a70472a17bbd8e0ade856173b31d9
-
Filesize
96KB
MD5aa417e0033e0541a161ab49f6b3e3a4e
SHA105a8487c433bc3ba475dc798e9fa1670dc25264d
SHA256f13799b891adb8e8df7a7f4e58bac812da9ed5ff121053077897c2b4ed8ab5f8
SHA51232948032c9fd8be3f203be8ad07f2cd2b346234488654f3f51893bbdf9bcbead63063f14be0319c3cafbecaca41e7d991759792c15041363eb2bda8114e64967