Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
Resource
win7-20240729-en
General
-
Target
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
-
Size
96KB
-
MD5
61a1cb816a8894547b2256ee527225bf
-
SHA1
97f0ec975b33cf88b9e530bbec8adb1142e52a17
-
SHA256
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08
-
SHA512
fe674302ac6df2b610d5f6799cfd42c9e33b26e5e97d977665aa84a61976b6a5a3e4aa78a97c9e2ad6f5200eec73e1fdf683e6e73288b259b213543d4026ff27
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxa:xGs8cd8eXlYairZYqMddH13a
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2552 omsecor.exe 2892 omsecor.exe 1012 omsecor.exe 316 omsecor.exe 3032 omsecor.exe 888 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1340 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 1340 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 2552 omsecor.exe 2892 omsecor.exe 2892 omsecor.exe 316 omsecor.exe 316 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2308 set thread context of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2552 set thread context of 2892 2552 omsecor.exe 32 PID 1012 set thread context of 316 1012 omsecor.exe 35 PID 3032 set thread context of 888 3032 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2308 wrote to memory of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2308 wrote to memory of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2308 wrote to memory of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2308 wrote to memory of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2308 wrote to memory of 1340 2308 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 1340 wrote to memory of 2552 1340 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 1340 wrote to memory of 2552 1340 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 1340 wrote to memory of 2552 1340 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 1340 wrote to memory of 2552 1340 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 2552 wrote to memory of 2892 2552 omsecor.exe 32 PID 2552 wrote to memory of 2892 2552 omsecor.exe 32 PID 2552 wrote to memory of 2892 2552 omsecor.exe 32 PID 2552 wrote to memory of 2892 2552 omsecor.exe 32 PID 2552 wrote to memory of 2892 2552 omsecor.exe 32 PID 2552 wrote to memory of 2892 2552 omsecor.exe 32 PID 2892 wrote to memory of 1012 2892 omsecor.exe 34 PID 2892 wrote to memory of 1012 2892 omsecor.exe 34 PID 2892 wrote to memory of 1012 2892 omsecor.exe 34 PID 2892 wrote to memory of 1012 2892 omsecor.exe 34 PID 1012 wrote to memory of 316 1012 omsecor.exe 35 PID 1012 wrote to memory of 316 1012 omsecor.exe 35 PID 1012 wrote to memory of 316 1012 omsecor.exe 35 PID 1012 wrote to memory of 316 1012 omsecor.exe 35 PID 1012 wrote to memory of 316 1012 omsecor.exe 35 PID 1012 wrote to memory of 316 1012 omsecor.exe 35 PID 316 wrote to memory of 3032 316 omsecor.exe 36 PID 316 wrote to memory of 3032 316 omsecor.exe 36 PID 316 wrote to memory of 3032 316 omsecor.exe 36 PID 316 wrote to memory of 3032 316 omsecor.exe 36 PID 3032 wrote to memory of 888 3032 omsecor.exe 37 PID 3032 wrote to memory of 888 3032 omsecor.exe 37 PID 3032 wrote to memory of 888 3032 omsecor.exe 37 PID 3032 wrote to memory of 888 3032 omsecor.exe 37 PID 3032 wrote to memory of 888 3032 omsecor.exe 37 PID 3032 wrote to memory of 888 3032 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exeC:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5045abfcbc28cb864ff7e4efbebf736a7
SHA1a3eeca0aefe9437a8b5f401895ec7ab96a71ba5e
SHA25639e34a66804a5c5311374661b5c6b3404c3301b9fbbec2184ad591a137e1c9e2
SHA51215b758317856b5d9935f355b9ce621837859e043044e266e09223abbcb559bbf284638f3ac7f5e7356efa08cb373226c9d95e2c7d6db16e020e8d6e775549b80
-
Filesize
96KB
MD5a14032d58a8a33d8f6226182137b68d8
SHA10a18e7f58c5f1a5575c4b701412cb17ce0c9a31a
SHA2565d7cc9784ca85e6e8d0f23787a49aa349e8d7a111dbb51cdc8dba4300ed450f5
SHA51203cfb5889a49f0b9c2213953c321f34c1965945f3d63ef587d94566e1b8bead7980aed20ef32ac76907922cd624cbf2cd71dd3168e9b55567c7209ad5d66321f
-
Filesize
96KB
MD5fb433ef1099b3a34009682890498388c
SHA182a67c44b898bc9e90bbe53f215ee5a3759ba789
SHA2564af608df041a886ab649233090dcbbdbf72d5e968837a582d49bcd153c86e9f2
SHA512341fd211eb3d9005046322d4d577eec85732a7864a054fcbc1eb7e27ed266d7659fcc2fb772ff323520254cd0dd428d05c916dc4b82a9662c314e510a614f816