Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:44
Static task
static1
Behavioral task
behavioral1
Sample
764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe
Resource
win7-20241010-en
General
-
Target
764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe
-
Size
96KB
-
MD5
07b7492e8fbdce79ab235211e06b1e73
-
SHA1
6ba6a7862a0b42f343deb2872ca599e1d41fdef3
-
SHA256
764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e
-
SHA512
8360139355212aaed503ec588d0ea1c1d3bc9c67f953ccf28d3c446ddb483f837b23591d79feedeca88135daa268d4fa9fc3f470a175c8ea59c92406434527bd
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxO:UGs8cd8eXlYairZYqMddH13O
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1784 omsecor.exe 2988 omsecor.exe 764 omsecor.exe 1440 omsecor.exe 1792 omsecor.exe 2188 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2536 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 2536 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 1784 omsecor.exe 2988 omsecor.exe 2988 omsecor.exe 1440 omsecor.exe 1440 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1668 set thread context of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 1784 set thread context of 2988 1784 omsecor.exe 33 PID 764 set thread context of 1440 764 omsecor.exe 37 PID 1792 set thread context of 2188 1792 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 1668 wrote to memory of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 1668 wrote to memory of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 1668 wrote to memory of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 1668 wrote to memory of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 1668 wrote to memory of 2536 1668 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 31 PID 2536 wrote to memory of 1784 2536 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 32 PID 2536 wrote to memory of 1784 2536 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 32 PID 2536 wrote to memory of 1784 2536 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 32 PID 2536 wrote to memory of 1784 2536 764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe 32 PID 1784 wrote to memory of 2988 1784 omsecor.exe 33 PID 1784 wrote to memory of 2988 1784 omsecor.exe 33 PID 1784 wrote to memory of 2988 1784 omsecor.exe 33 PID 1784 wrote to memory of 2988 1784 omsecor.exe 33 PID 1784 wrote to memory of 2988 1784 omsecor.exe 33 PID 1784 wrote to memory of 2988 1784 omsecor.exe 33 PID 2988 wrote to memory of 764 2988 omsecor.exe 36 PID 2988 wrote to memory of 764 2988 omsecor.exe 36 PID 2988 wrote to memory of 764 2988 omsecor.exe 36 PID 2988 wrote to memory of 764 2988 omsecor.exe 36 PID 764 wrote to memory of 1440 764 omsecor.exe 37 PID 764 wrote to memory of 1440 764 omsecor.exe 37 PID 764 wrote to memory of 1440 764 omsecor.exe 37 PID 764 wrote to memory of 1440 764 omsecor.exe 37 PID 764 wrote to memory of 1440 764 omsecor.exe 37 PID 764 wrote to memory of 1440 764 omsecor.exe 37 PID 1440 wrote to memory of 1792 1440 omsecor.exe 38 PID 1440 wrote to memory of 1792 1440 omsecor.exe 38 PID 1440 wrote to memory of 1792 1440 omsecor.exe 38 PID 1440 wrote to memory of 1792 1440 omsecor.exe 38 PID 1792 wrote to memory of 2188 1792 omsecor.exe 39 PID 1792 wrote to memory of 2188 1792 omsecor.exe 39 PID 1792 wrote to memory of 2188 1792 omsecor.exe 39 PID 1792 wrote to memory of 2188 1792 omsecor.exe 39 PID 1792 wrote to memory of 2188 1792 omsecor.exe 39 PID 1792 wrote to memory of 2188 1792 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe"C:\Users\Admin\AppData\Local\Temp\764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exeC:\Users\Admin\AppData\Local\Temp\764113b926fee9a741c7029d91574f7ba428089e4a6e40f62bad10175400627e.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD513e5245f5545fa11b43af198418e38f8
SHA1dfce254778e216e301974db478821281e861333a
SHA2564b120075cf0b10212fd436a95c01409bf84a5e06da4a740eb3e1b8af261340d3
SHA512872f7998578d69e75c13f84cd0af2fa3a5f9a98f894b4bf0382b7c32a3fdeeab7342abf62bd9def610a66d0900794518fc6760046e958553a2bef81befcee505
-
Filesize
96KB
MD53fc16f5d38462f69d006a6844fab7b03
SHA143db6a11554784c891dd8dc187263d5fc79e47be
SHA2568d834b2edf5f60a9662bd074c5787ba78ef27174fe517df37dfdd4cc768176e5
SHA5122258cca998cbb866e7c103b259ed0cc18e95b2dfa4333bf64d03f0fa6b05d9204a4359104b2fdfde42e9ed426b5b69476d15c9b8fe7ae06f76cc9a84d15cee0d
-
Filesize
96KB
MD5f7694faa48bcb34d86e64560af6ac776
SHA1bb56d828e92e0cfbfb1c48956507e0fa316e1fc2
SHA256021124572dfb2727cb8d90b8894f2d8bc2530fe24ff48d140590191a945103ba
SHA5129c6f43fd75e6def4a7234c7270e2d8be3cc05d4d1f5527734bea6b8a2195975303f31838f2b5d4f88a2ed46ddab6ec230d59b91c39cacc906efe091f02362aa1