Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-12-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
Resource
win7-20240903-en
General
-
Target
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe
-
Size
96KB
-
MD5
809d8bedb2da450b588bf82e9a118fe4
-
SHA1
5cb2c9863ddc2ba5346967bf0780554c8dc120f9
-
SHA256
8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72
-
SHA512
4768075e7c02683f09e9d23339b5a69724c3439c711244c7761f9ceaf44f7c4a6d8b1189ab47214e4aa4a27e1fad1f07b4be4d3d374c87326611fc68be378287
-
SSDEEP
1536:hnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxq:hGs8cd8eXlYairZYqMddH13q
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2768 omsecor.exe 2684 omsecor.exe 3036 omsecor.exe 2836 omsecor.exe 476 omsecor.exe 1428 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1232 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 1232 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 2768 omsecor.exe 2684 omsecor.exe 2684 omsecor.exe 2836 omsecor.exe 2836 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2676 set thread context of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2768 set thread context of 2684 2768 omsecor.exe 33 PID 3036 set thread context of 2836 3036 omsecor.exe 36 PID 476 set thread context of 1428 476 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2676 wrote to memory of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2676 wrote to memory of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2676 wrote to memory of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2676 wrote to memory of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 2676 wrote to memory of 1232 2676 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 31 PID 1232 wrote to memory of 2768 1232 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 1232 wrote to memory of 2768 1232 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 1232 wrote to memory of 2768 1232 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 1232 wrote to memory of 2768 1232 8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe 32 PID 2768 wrote to memory of 2684 2768 omsecor.exe 33 PID 2768 wrote to memory of 2684 2768 omsecor.exe 33 PID 2768 wrote to memory of 2684 2768 omsecor.exe 33 PID 2768 wrote to memory of 2684 2768 omsecor.exe 33 PID 2768 wrote to memory of 2684 2768 omsecor.exe 33 PID 2768 wrote to memory of 2684 2768 omsecor.exe 33 PID 2684 wrote to memory of 3036 2684 omsecor.exe 35 PID 2684 wrote to memory of 3036 2684 omsecor.exe 35 PID 2684 wrote to memory of 3036 2684 omsecor.exe 35 PID 2684 wrote to memory of 3036 2684 omsecor.exe 35 PID 3036 wrote to memory of 2836 3036 omsecor.exe 36 PID 3036 wrote to memory of 2836 3036 omsecor.exe 36 PID 3036 wrote to memory of 2836 3036 omsecor.exe 36 PID 3036 wrote to memory of 2836 3036 omsecor.exe 36 PID 3036 wrote to memory of 2836 3036 omsecor.exe 36 PID 3036 wrote to memory of 2836 3036 omsecor.exe 36 PID 2836 wrote to memory of 476 2836 omsecor.exe 37 PID 2836 wrote to memory of 476 2836 omsecor.exe 37 PID 2836 wrote to memory of 476 2836 omsecor.exe 37 PID 2836 wrote to memory of 476 2836 omsecor.exe 37 PID 476 wrote to memory of 1428 476 omsecor.exe 38 PID 476 wrote to memory of 1428 476 omsecor.exe 38 PID 476 wrote to memory of 1428 476 omsecor.exe 38 PID 476 wrote to memory of 1428 476 omsecor.exe 38 PID 476 wrote to memory of 1428 476 omsecor.exe 38 PID 476 wrote to memory of 1428 476 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exeC:\Users\Admin\AppData\Local\Temp\8b0613982b6a7f0542a7dbfce43aa216a043ce9a2a2a24a7a2c77a6e8fa6aa72.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1428
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c6bf364b3406ef7c60126e3cbb80b9bf
SHA1faaddfdd9e3a2caf92c6d7c3b2fd7bd761059ca5
SHA2566093d98e399c27ffe14f30ad73b6622b8c05249a55c24b9b3868f94bab999281
SHA5125f405da0b7d8075279ac0078dfdeaa0cb619aee0d4826fd3c2239ee76b6b9b002142c19d04a54581ea5a6ef7c587d164517e4e0c4eea13b203fcef029a1ae034
-
Filesize
96KB
MD56e897a612472ad8b51062a6844a8a17b
SHA15c4ba9ffcfbe52029f8bfadb883764b723d3fd38
SHA2560360e1344a1faf0e855e4798bb824e5492159b6c35b83f1cf43024a9bbc1adf9
SHA51253e606db7f73e85a5f0b269747d938ac07e3abf32d601fcb4ef89f4a8804340b3354887b9e65bed6ac3be8c338e236bf81c493cefdca2feeee2c3f0edc809ed8
-
Filesize
96KB
MD5c98c045e4a26a807745c69ee5fd9a65f
SHA12ccf2c46823a65a8971b9361f6770c6cfc8dcdba
SHA256663cfd61a11eb13788f8b0f08c6ef227454240f2435be86d1431378e605c7864
SHA51220de63a12f0edbf9331c712458b99b2ba2856732db3d301a93f0e57556c4e6b08a7a2df766844071497dd895d4dab79b5f1d5e04f697b66341b59c7912f492d8