Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe
Resource
win7-20240903-en
General
-
Target
0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe
-
Size
96KB
-
MD5
9c367121455f7c190a2b95b57eb4f580
-
SHA1
80aa31fc53a3b99bfeda3f4ba8234f2bd8de98ef
-
SHA256
0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28
-
SHA512
a419dc985d1188d35f9922d02baa73b86c9abdfba62293732d1caf9500940cc012f4ffba1aae87caede45d9772d90d8c0e8db6c419f3bfd9d5cd1605c126e8ac
-
SSDEEP
1536:gnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:gGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1228 omsecor.exe 1668 omsecor.exe 1428 omsecor.exe 828 omsecor.exe 2640 omsecor.exe 2620 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2512 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 2512 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 1228 omsecor.exe 1668 omsecor.exe 1668 omsecor.exe 828 omsecor.exe 828 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2500 set thread context of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 1228 set thread context of 1668 1228 omsecor.exe 32 PID 1428 set thread context of 828 1428 omsecor.exe 36 PID 2640 set thread context of 2620 2640 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 2500 wrote to memory of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 2500 wrote to memory of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 2500 wrote to memory of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 2500 wrote to memory of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 2500 wrote to memory of 2512 2500 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 30 PID 2512 wrote to memory of 1228 2512 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 31 PID 2512 wrote to memory of 1228 2512 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 31 PID 2512 wrote to memory of 1228 2512 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 31 PID 2512 wrote to memory of 1228 2512 0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe 31 PID 1228 wrote to memory of 1668 1228 omsecor.exe 32 PID 1228 wrote to memory of 1668 1228 omsecor.exe 32 PID 1228 wrote to memory of 1668 1228 omsecor.exe 32 PID 1228 wrote to memory of 1668 1228 omsecor.exe 32 PID 1228 wrote to memory of 1668 1228 omsecor.exe 32 PID 1228 wrote to memory of 1668 1228 omsecor.exe 32 PID 1668 wrote to memory of 1428 1668 omsecor.exe 35 PID 1668 wrote to memory of 1428 1668 omsecor.exe 35 PID 1668 wrote to memory of 1428 1668 omsecor.exe 35 PID 1668 wrote to memory of 1428 1668 omsecor.exe 35 PID 1428 wrote to memory of 828 1428 omsecor.exe 36 PID 1428 wrote to memory of 828 1428 omsecor.exe 36 PID 1428 wrote to memory of 828 1428 omsecor.exe 36 PID 1428 wrote to memory of 828 1428 omsecor.exe 36 PID 1428 wrote to memory of 828 1428 omsecor.exe 36 PID 1428 wrote to memory of 828 1428 omsecor.exe 36 PID 828 wrote to memory of 2640 828 omsecor.exe 37 PID 828 wrote to memory of 2640 828 omsecor.exe 37 PID 828 wrote to memory of 2640 828 omsecor.exe 37 PID 828 wrote to memory of 2640 828 omsecor.exe 37 PID 2640 wrote to memory of 2620 2640 omsecor.exe 38 PID 2640 wrote to memory of 2620 2640 omsecor.exe 38 PID 2640 wrote to memory of 2620 2640 omsecor.exe 38 PID 2640 wrote to memory of 2620 2640 omsecor.exe 38 PID 2640 wrote to memory of 2620 2640 omsecor.exe 38 PID 2640 wrote to memory of 2620 2640 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe"C:\Users\Admin\AppData\Local\Temp\0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exeC:\Users\Admin\AppData\Local\Temp\0970457ec5e1be106a356d6c657e11a6e5c4627724d74641915dd1dcd9698e28N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5042e6d2f76a4b6dc1cd9160fb0477738
SHA16c529e1796a9bb4343e51efcb4e9179a87598e5d
SHA25625951659ea125664d7125587ee82314a1815f66fe5da4831fb96ca73e9d567e9
SHA5128baec220451eed3091dc728327db000b552421e7902baf00740368841a5c49c5a21d10603da7eb9ad485a680d9ce38b6136fdae551d6af48de830a06e4714dfc
-
Filesize
96KB
MD5f3de77d622018a391bca1f84d44304cd
SHA1d8ad7985b6f173b4c31d5121829cec474edc3417
SHA25651eb9bee6ee5de5fc9947261b509f7ca945fbdc6dcff5e7bff200253a32546bc
SHA512ea04785da94d1772bfdb55d975834b037830fbd182660bae33cc97fdd49b0cae76aad0840d0873e0e1e6cf0da252121f7ef2d98f20a3e4a73ff69f3174aca04d
-
Filesize
96KB
MD5aee100228fc628e9806bea67f9e1f4ae
SHA1275a5ce934aeff4fa5549fa311b2743c9d7b13f3
SHA256368ba76acec26bad603e05e291294696499d8d931daefb72d7af5e65747af29e
SHA5129d716f32ca1d798cf78168d3f0e769869be0d0460cd32ba687a021a706b69bd841552955210c72847ae002892dab79165419800ba40a916aa7658535f0f23d0c