Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 15:59
Static task
static1
Behavioral task
behavioral1
Sample
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
Resource
win7-20240903-en
General
-
Target
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
-
Size
96KB
-
MD5
809d8bedb2da450b588bf82e9a118fe4
-
SHA1
5cb2c9863ddc2ba5346967bf0780554c8dc120f9
-
SHA256
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72
-
SHA512
4768075e7c02683f09e9d23339b5a69724c3439c711244c7761f9ceaf44f7c4a6d8b1189ab47214e4aa4a27e1fad1f07b4be4d3d374c87326611fc68be378287
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:hGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2312 omsecor.exe 2820 omsecor.exe 1996 omsecor.exe 2728 omsecor.exe 1724 omsecor.exe 2248 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2816 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 2816 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 2312 omsecor.exe 2820 omsecor.exe 2820 omsecor.exe 2728 omsecor.exe 2728 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 540 set thread context of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2312 set thread context of 2820 2312 omsecor.exe 33 PID 1996 set thread context of 2728 1996 omsecor.exe 36 PID 1724 set thread context of 2248 1724 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 540 wrote to memory of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 540 wrote to memory of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 540 wrote to memory of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 540 wrote to memory of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 540 wrote to memory of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 540 wrote to memory of 2816 540 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2816 wrote to memory of 2312 2816 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2816 wrote to memory of 2312 2816 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2816 wrote to memory of 2312 2816 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2816 wrote to memory of 2312 2816 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2312 wrote to memory of 2820 2312 omsecor.exe 33 PID 2312 wrote to memory of 2820 2312 omsecor.exe 33 PID 2312 wrote to memory of 2820 2312 omsecor.exe 33 PID 2312 wrote to memory of 2820 2312 omsecor.exe 33 PID 2312 wrote to memory of 2820 2312 omsecor.exe 33 PID 2312 wrote to memory of 2820 2312 omsecor.exe 33 PID 2820 wrote to memory of 1996 2820 omsecor.exe 35 PID 2820 wrote to memory of 1996 2820 omsecor.exe 35 PID 2820 wrote to memory of 1996 2820 omsecor.exe 35 PID 2820 wrote to memory of 1996 2820 omsecor.exe 35 PID 1996 wrote to memory of 2728 1996 omsecor.exe 36 PID 1996 wrote to memory of 2728 1996 omsecor.exe 36 PID 1996 wrote to memory of 2728 1996 omsecor.exe 36 PID 1996 wrote to memory of 2728 1996 omsecor.exe 36 PID 1996 wrote to memory of 2728 1996 omsecor.exe 36 PID 1996 wrote to memory of 2728 1996 omsecor.exe 36 PID 2728 wrote to memory of 1724 2728 omsecor.exe 37 PID 2728 wrote to memory of 1724 2728 omsecor.exe 37 PID 2728 wrote to memory of 1724 2728 omsecor.exe 37 PID 2728 wrote to memory of 1724 2728 omsecor.exe 37 PID 1724 wrote to memory of 2248 1724 omsecor.exe 38 PID 1724 wrote to memory of 2248 1724 omsecor.exe 38 PID 1724 wrote to memory of 2248 1724 omsecor.exe 38 PID 1724 wrote to memory of 2248 1724 omsecor.exe 38 PID 1724 wrote to memory of 2248 1724 omsecor.exe 38 PID 1724 wrote to memory of 2248 1724 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exeC:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD56e897a612472ad8b51062a6844a8a17b
SHA15c4ba9ffcfbe52029f8bfadb883764b723d3fd38
SHA2560360e1344a1faf0e855e4798bb824e5492159b6c35b83f1cf43024a9bbc1adf9
SHA51253e606db7f73e85a5f0b269747d938ac07e3abf32d601fcb4ef89f4a8804340b3354887b9e65bed6ac3be8c338e236bf81c493cefdca2feeee2c3f0edc809ed8
-
Filesize
96KB
MD5cce8dc713b0875fc5751f048f8713d99
SHA1611b63c41ba6f6a2fb8d0d0a44d4451a082281e0
SHA256ba7758bd07fda29c349ffb027c413d53afc4d44e6fdd60c0fe634d16c5e45042
SHA512c94ccc54e6fe4f7a5b1fdff9e408a4fb11f7745483f2335444f4ed32ff801ceb2006dec9c1be8c6d75683fa12dfcbdabe1a3e91ff7181ca7a7319b816ceffcfd
-
Filesize
96KB
MD5b29dc93f5d534a8f4cd36905f97c8c8e
SHA1156aa66917aaf2996963d76c0827219542849e32
SHA256ae55abb9ecbba53ae8795d4b05367b2b73e08fc049d24c8047255eee8cdee6cd
SHA512d97dfecb519156434dd628ec008009d4b961c03b244ce6a7c97b09bcbbacdb01fb30ee4681c9439929b9609383eaf31d336980727cfac0f212ce4983ead26c66