Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe
Resource
win7-20240903-en
General
-
Target
b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe
-
Size
96KB
-
MD5
4c3bb51b742d063506cd6400a4601577
-
SHA1
24186ae58bc65217faba05eeaa80db7d998a3fcf
-
SHA256
b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd
-
SHA512
3dc054d0748900a50d7a810404e0ed7fab852428483bd98acda79b373171592deec1804bd26526da11d9d587f8e4d5049f286ba45b9de8c9273362eb28f942e9
-
SSDEEP
1536:CnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxT:CGs8cd8eXlYairZYqMddH13T
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2288 omsecor.exe 316 omsecor.exe 1696 omsecor.exe 1936 omsecor.exe 1736 omsecor.exe 756 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1628 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 1628 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 2288 omsecor.exe 316 omsecor.exe 316 omsecor.exe 1936 omsecor.exe 1936 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2124 set thread context of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 2288 set thread context of 316 2288 omsecor.exe 30 PID 1696 set thread context of 1936 1696 omsecor.exe 35 PID 1736 set thread context of 756 1736 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2124 wrote to memory of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 2124 wrote to memory of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 2124 wrote to memory of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 2124 wrote to memory of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 2124 wrote to memory of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 2124 wrote to memory of 1628 2124 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 28 PID 1628 wrote to memory of 2288 1628 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 29 PID 1628 wrote to memory of 2288 1628 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 29 PID 1628 wrote to memory of 2288 1628 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 29 PID 1628 wrote to memory of 2288 1628 b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe 29 PID 2288 wrote to memory of 316 2288 omsecor.exe 30 PID 2288 wrote to memory of 316 2288 omsecor.exe 30 PID 2288 wrote to memory of 316 2288 omsecor.exe 30 PID 2288 wrote to memory of 316 2288 omsecor.exe 30 PID 2288 wrote to memory of 316 2288 omsecor.exe 30 PID 2288 wrote to memory of 316 2288 omsecor.exe 30 PID 316 wrote to memory of 1696 316 omsecor.exe 34 PID 316 wrote to memory of 1696 316 omsecor.exe 34 PID 316 wrote to memory of 1696 316 omsecor.exe 34 PID 316 wrote to memory of 1696 316 omsecor.exe 34 PID 1696 wrote to memory of 1936 1696 omsecor.exe 35 PID 1696 wrote to memory of 1936 1696 omsecor.exe 35 PID 1696 wrote to memory of 1936 1696 omsecor.exe 35 PID 1696 wrote to memory of 1936 1696 omsecor.exe 35 PID 1696 wrote to memory of 1936 1696 omsecor.exe 35 PID 1696 wrote to memory of 1936 1696 omsecor.exe 35 PID 1936 wrote to memory of 1736 1936 omsecor.exe 36 PID 1936 wrote to memory of 1736 1936 omsecor.exe 36 PID 1936 wrote to memory of 1736 1936 omsecor.exe 36 PID 1936 wrote to memory of 1736 1936 omsecor.exe 36 PID 1736 wrote to memory of 756 1736 omsecor.exe 37 PID 1736 wrote to memory of 756 1736 omsecor.exe 37 PID 1736 wrote to memory of 756 1736 omsecor.exe 37 PID 1736 wrote to memory of 756 1736 omsecor.exe 37 PID 1736 wrote to memory of 756 1736 omsecor.exe 37 PID 1736 wrote to memory of 756 1736 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe"C:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exeC:\Users\Admin\AppData\Local\Temp\b8a4b2d8902d2ed4c79a37dd2559209064611c27f04026f423d54740d13ccdcd.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:756
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5df663fe551c00f69dbbf3ae73e98506b
SHA12305c30228d80319cd1977ceb67353e3d4b8d504
SHA256bf765286d2cb6a3201a47268a09692604f42862d19fc698a00cb1616bf18915e
SHA5120d89bc2ad7bf243ec0eebd5b313143d2fe7e2ad85b582f48580ea2159abbd7a298d6469bad811eeffdbe394e42856b20456838b688d852c323407aaf066437af
-
Filesize
96KB
MD5fada79126d1caec75100d30e9e9a0c80
SHA1f9df9d359fb576cd36e6d4a52b0c38ee590a0c94
SHA25669c796a6f6dbeb067ee92705a2a76280857feb91d5594d9d4ec0d228e03cbf93
SHA512df4db013140b17fe15ac0349e41d77e8cb8faea241d8f7b3c2c0807cbc8f62b6be464c3c36804a86d55dbbf8fe7fbf63e479dca5a35ea21f72b3d02a59ce0fe2
-
Filesize
96KB
MD5a1a16ae99466ff8500c6a4b0bd0bd1ef
SHA122111fa4c0f67c222573a3357b664097e25a756b
SHA256b273b771d41d0753739bdfdea6db78ce58537f7f428532f02b5779cbf3fcfd79
SHA5124389313b4d667c08a88a1072055b1ff88dde8e379d905dc8533faa2dbdd98771654b662728fa2120eb95b564bee127c19b38f1efeee5c575fa8d4d26357e0802