Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe
Resource
win7-20240729-en
General
-
Target
fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe
-
Size
96KB
-
MD5
6ced5dec9139ac608aa89bdc528bc2ae
-
SHA1
ee1ab36b4ac0a9b1726ba0a6b2a555a04cfc7ed6
-
SHA256
fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e
-
SHA512
3f2eb264fc7b36f5782e6effe2c9b5df3534bd425103cb9135828c7cc5826d6b692bc2fc9193fd83a17f88c0a212ba6219e61cb17326b71c1c515d0cdc7f5244
-
SSDEEP
1536:WnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:WGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2120 omsecor.exe 292 omsecor.exe 2604 omsecor.exe 1340 omsecor.exe 2152 omsecor.exe 1180 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1952 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 1952 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 2120 omsecor.exe 292 omsecor.exe 292 omsecor.exe 1340 omsecor.exe 1340 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1976 set thread context of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 2120 set thread context of 292 2120 omsecor.exe 32 PID 2604 set thread context of 1340 2604 omsecor.exe 36 PID 2152 set thread context of 1180 2152 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 1976 wrote to memory of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 1976 wrote to memory of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 1976 wrote to memory of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 1976 wrote to memory of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 1976 wrote to memory of 1952 1976 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 30 PID 1952 wrote to memory of 2120 1952 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 31 PID 1952 wrote to memory of 2120 1952 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 31 PID 1952 wrote to memory of 2120 1952 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 31 PID 1952 wrote to memory of 2120 1952 fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe 31 PID 2120 wrote to memory of 292 2120 omsecor.exe 32 PID 2120 wrote to memory of 292 2120 omsecor.exe 32 PID 2120 wrote to memory of 292 2120 omsecor.exe 32 PID 2120 wrote to memory of 292 2120 omsecor.exe 32 PID 2120 wrote to memory of 292 2120 omsecor.exe 32 PID 2120 wrote to memory of 292 2120 omsecor.exe 32 PID 292 wrote to memory of 2604 292 omsecor.exe 35 PID 292 wrote to memory of 2604 292 omsecor.exe 35 PID 292 wrote to memory of 2604 292 omsecor.exe 35 PID 292 wrote to memory of 2604 292 omsecor.exe 35 PID 2604 wrote to memory of 1340 2604 omsecor.exe 36 PID 2604 wrote to memory of 1340 2604 omsecor.exe 36 PID 2604 wrote to memory of 1340 2604 omsecor.exe 36 PID 2604 wrote to memory of 1340 2604 omsecor.exe 36 PID 2604 wrote to memory of 1340 2604 omsecor.exe 36 PID 2604 wrote to memory of 1340 2604 omsecor.exe 36 PID 1340 wrote to memory of 2152 1340 omsecor.exe 37 PID 1340 wrote to memory of 2152 1340 omsecor.exe 37 PID 1340 wrote to memory of 2152 1340 omsecor.exe 37 PID 1340 wrote to memory of 2152 1340 omsecor.exe 37 PID 2152 wrote to memory of 1180 2152 omsecor.exe 38 PID 2152 wrote to memory of 1180 2152 omsecor.exe 38 PID 2152 wrote to memory of 1180 2152 omsecor.exe 38 PID 2152 wrote to memory of 1180 2152 omsecor.exe 38 PID 2152 wrote to memory of 1180 2152 omsecor.exe 38 PID 2152 wrote to memory of 1180 2152 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe"C:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exeC:\Users\Admin\AppData\Local\Temp\fecaaa14640d1168431884116993ffe918a5a8bfcf40be518b2e8db53975e39e.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5e16b61cd5ae180d84c590fffbebed3e0
SHA1c7454950d51ca3a9e640cf6f29623b442a280dd5
SHA2565915d70518585f9cce4cabe36c7430ff9058bde33d63d297788c3c02f681fa9b
SHA512c4a70f3efd0c24a8698f0f6f0826e295fecb1a67067a1e51742581e8e45c50918a427f1595fb95232c5f4e7d335f8ee78e524395ee41ac4349bb6538ad94a368
-
Filesize
96KB
MD5014fcd405fea2c3b0f1a7216cc52d227
SHA1f6ec4d1021ae6c917caa6b1cd8ac425ab09ce40d
SHA2568670c6078ca006f12c46f667e8a691f8cc423b43c8ba300e09c0cf415e044ceb
SHA512f794e90f7b3ee0a4c8779a20462ac62822ba0fbd5bf2aa9bc7140a77695ef1c0f906f4165634a65832d91bf3c0c57f27022e1451bc5a72c29cc0dab9896d9329
-
Filesize
96KB
MD586acb44249b70cbed822692961bba367
SHA119371316603008bde4d96e1215701f4251b6c06e
SHA2560202c66306f1ad0a209ba961e85f76cb0b67c92f7fb00eccf09725c365c489b2
SHA51292b9fcd4750a0d53ccc13ae654c3b3db207811ad0a82dd025d8df1c3b692f87c324e02108a0ac927464b0c60117bf2a649700f10c9aad7da5aabf2a476a2cc7f