Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
Resource
win7-20240903-en
General
-
Target
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe
-
Size
96KB
-
MD5
368d064efacaaa20abc57a01c83e0f3e
-
SHA1
2f0a36ebc6e185071605afa653ad3da504d4df62
-
SHA256
3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e
-
SHA512
641a4ac039b2cb409b615069c1874a004e0f0da2e4a69937bd176a089c12b1960597afb12bb10b0f218ecc126cf85ad53a5ae4f099844ab316e3d43c20f172c9
-
SSDEEP
1536:+nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxh:+Gs8cd8eXlYairZYqMddH13h
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2824 omsecor.exe 2652 omsecor.exe 1992 omsecor.exe 768 omsecor.exe 2204 omsecor.exe 1896 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1732 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 1732 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 2824 omsecor.exe 2652 omsecor.exe 2652 omsecor.exe 768 omsecor.exe 768 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1916 set thread context of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 2824 set thread context of 2652 2824 omsecor.exe 33 PID 1992 set thread context of 768 1992 omsecor.exe 37 PID 2204 set thread context of 1896 2204 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1916 wrote to memory of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 1916 wrote to memory of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 1916 wrote to memory of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 1916 wrote to memory of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 1916 wrote to memory of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 1916 wrote to memory of 1732 1916 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 31 PID 1732 wrote to memory of 2824 1732 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 32 PID 1732 wrote to memory of 2824 1732 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 32 PID 1732 wrote to memory of 2824 1732 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 32 PID 1732 wrote to memory of 2824 1732 3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe 32 PID 2824 wrote to memory of 2652 2824 omsecor.exe 33 PID 2824 wrote to memory of 2652 2824 omsecor.exe 33 PID 2824 wrote to memory of 2652 2824 omsecor.exe 33 PID 2824 wrote to memory of 2652 2824 omsecor.exe 33 PID 2824 wrote to memory of 2652 2824 omsecor.exe 33 PID 2824 wrote to memory of 2652 2824 omsecor.exe 33 PID 2652 wrote to memory of 1992 2652 omsecor.exe 36 PID 2652 wrote to memory of 1992 2652 omsecor.exe 36 PID 2652 wrote to memory of 1992 2652 omsecor.exe 36 PID 2652 wrote to memory of 1992 2652 omsecor.exe 36 PID 1992 wrote to memory of 768 1992 omsecor.exe 37 PID 1992 wrote to memory of 768 1992 omsecor.exe 37 PID 1992 wrote to memory of 768 1992 omsecor.exe 37 PID 1992 wrote to memory of 768 1992 omsecor.exe 37 PID 1992 wrote to memory of 768 1992 omsecor.exe 37 PID 1992 wrote to memory of 768 1992 omsecor.exe 37 PID 768 wrote to memory of 2204 768 omsecor.exe 38 PID 768 wrote to memory of 2204 768 omsecor.exe 38 PID 768 wrote to memory of 2204 768 omsecor.exe 38 PID 768 wrote to memory of 2204 768 omsecor.exe 38 PID 2204 wrote to memory of 1896 2204 omsecor.exe 39 PID 2204 wrote to memory of 1896 2204 omsecor.exe 39 PID 2204 wrote to memory of 1896 2204 omsecor.exe 39 PID 2204 wrote to memory of 1896 2204 omsecor.exe 39 PID 2204 wrote to memory of 1896 2204 omsecor.exe 39 PID 2204 wrote to memory of 1896 2204 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exeC:\Users\Admin\AppData\Local\Temp\3a76b4b133225ee0fe5eeff15a25f35ce64ed34d03982a8953619d038039093e.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5bf7081c5fb72643cae63538b0128b8b8
SHA1ac3e5ac8e5d58b60740da52458b17c762cd17024
SHA25644ac5aa265f57cf9df83355e6ba0f6dc64f91351229b6ebba9946c514b07347f
SHA5124653a7c3f8c03681f38a52e6bd7c46b2f68b700382e95218e04579f22087ef6473b3cc1c0cef7837fcc3410c9278a5875cafc9867dbfadc9fdd58eda1d4b5711
-
Filesize
96KB
MD5744a7cf2a2fe9a0bd5c7c76fa25ffad2
SHA1004a53893d9e82f177976164e519409f57d34678
SHA256cdbc9cbc942eba1683901ab4edab2b0455295e88f8ca0ddabf31381e9513dcb4
SHA512f8a12283996a8874eb198d357207e45f6eb406e5e820dfc774f9f1e37033f143897fb141d869fc4c79c9f4c8aca272b19e2f2ebb8443633e8a093ee9e6325861
-
Filesize
96KB
MD5e8b7777b59ff340feb93250a63dd2a37
SHA1dc698fea58f49f0505b95eaed0681d5b8a145ee5
SHA2563d475ccfbf3426c606c25d40547d2b7fb592aa92a1c416aec7c3cf80d33ecfd1
SHA51233e06934fabecdc6af56eb36d9f8a376690ca32f4baeb5bb4626d7ec050ed54527a08f07c8f317c2855edad1b83f9aa93244e8175c3fa4a130ff37c0bebdd9f1