Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
Resource
win7-20241010-en
General
-
Target
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe
-
Size
96KB
-
MD5
61a1cb816a8894547b2256ee527225bf
-
SHA1
97f0ec975b33cf88b9e530bbec8adb1142e52a17
-
SHA256
a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08
-
SHA512
fe674302ac6df2b610d5f6799cfd42c9e33b26e5e97d977665aa84a61976b6a5a3e4aa78a97c9e2ad6f5200eec73e1fdf683e6e73288b259b213543d4026ff27
-
SSDEEP
1536:xnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxa:xGs8cd8eXlYairZYqMddH13a
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2156 omsecor.exe 2364 omsecor.exe 2692 omsecor.exe 1044 omsecor.exe 1396 omsecor.exe 2556 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2052 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 2052 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 2156 omsecor.exe 2364 omsecor.exe 2364 omsecor.exe 1044 omsecor.exe 1044 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2444 set thread context of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2156 set thread context of 2364 2156 omsecor.exe 32 PID 2692 set thread context of 1044 2692 omsecor.exe 36 PID 1396 set thread context of 2556 1396 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2444 wrote to memory of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2444 wrote to memory of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2444 wrote to memory of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2444 wrote to memory of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2444 wrote to memory of 2052 2444 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 30 PID 2052 wrote to memory of 2156 2052 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 2052 wrote to memory of 2156 2052 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 2052 wrote to memory of 2156 2052 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 2052 wrote to memory of 2156 2052 a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe 31 PID 2156 wrote to memory of 2364 2156 omsecor.exe 32 PID 2156 wrote to memory of 2364 2156 omsecor.exe 32 PID 2156 wrote to memory of 2364 2156 omsecor.exe 32 PID 2156 wrote to memory of 2364 2156 omsecor.exe 32 PID 2156 wrote to memory of 2364 2156 omsecor.exe 32 PID 2156 wrote to memory of 2364 2156 omsecor.exe 32 PID 2364 wrote to memory of 2692 2364 omsecor.exe 35 PID 2364 wrote to memory of 2692 2364 omsecor.exe 35 PID 2364 wrote to memory of 2692 2364 omsecor.exe 35 PID 2364 wrote to memory of 2692 2364 omsecor.exe 35 PID 2692 wrote to memory of 1044 2692 omsecor.exe 36 PID 2692 wrote to memory of 1044 2692 omsecor.exe 36 PID 2692 wrote to memory of 1044 2692 omsecor.exe 36 PID 2692 wrote to memory of 1044 2692 omsecor.exe 36 PID 2692 wrote to memory of 1044 2692 omsecor.exe 36 PID 2692 wrote to memory of 1044 2692 omsecor.exe 36 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1044 wrote to memory of 1396 1044 omsecor.exe 37 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38 PID 1396 wrote to memory of 2556 1396 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exeC:\Users\Admin\AppData\Local\Temp\a72c7001af3c1186632aa490b0994b37523999f1ef83d22a175769eea589fa08.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a7bbe0144e81be41947e576738b22113
SHA1c66a0a42864b11e70b00bd6c78d647c07c25bb7d
SHA256ee318dbd9bf25680c82c8c0dbe2968ac9cbd21c637818a0f5864ff2e6d7f048b
SHA51240487ed719a81b72967d4064bab26517604aa3d9f80fd698e49009a2771dcfe766bd01ad8725e3c8cf2b2a2734401aabeed1b641a259148adb8cc35fbec41271
-
Filesize
96KB
MD5045abfcbc28cb864ff7e4efbebf736a7
SHA1a3eeca0aefe9437a8b5f401895ec7ab96a71ba5e
SHA25639e34a66804a5c5311374661b5c6b3404c3301b9fbbec2184ad591a137e1c9e2
SHA51215b758317856b5d9935f355b9ce621837859e043044e266e09223abbcb559bbf284638f3ac7f5e7356efa08cb373226c9d95e2c7d6db16e020e8d6e775549b80
-
Filesize
96KB
MD58eaedd7148ac72ba97a7ed1c007203ab
SHA1242af5038fb5656e6bc2ecd42d4f94da5427e12b
SHA25667c17bbecb4ded60119117faf9199f2c75d428604ed9fb6872290ed4b7d4fbfc
SHA5124a8da25d1d947ee85c17054f5dafc912ba2af105b45f004a54ed842c3d7925277388218a5c308b8bf1ee16ac5ddef3b8f885e5a17e1ccef042edbd3de5b528d1