Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/12/2024, 09:51
Static task
static1
Behavioral task
behavioral1
Sample
89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe
Resource
win7-20240708-en
General
-
Target
89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe
-
Size
96KB
-
MD5
e10b3a7a7069066eed78dadc8378cde7
-
SHA1
537f76364cb78e9b7a5d569a0eb0c02c7b20904e
-
SHA256
89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25
-
SHA512
9c42fc40335ee2169192235f6cd1c66dc0714facd9d76baa70c4076a43147bcc3bd36c1cd0065d381162cd8452eb77bd018d12c11fff35da8bb205e2f39ccc87
-
SSDEEP
1536:YnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:YGs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2832 omsecor.exe 2460 omsecor.exe 2092 omsecor.exe 1288 omsecor.exe 1144 omsecor.exe 2860 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3040 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 3040 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 2832 omsecor.exe 2460 omsecor.exe 2460 omsecor.exe 1288 omsecor.exe 1288 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2976 set thread context of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 2832 set thread context of 2460 2832 omsecor.exe 32 PID 2092 set thread context of 1288 2092 omsecor.exe 36 PID 1144 set thread context of 2860 1144 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 2976 wrote to memory of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 2976 wrote to memory of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 2976 wrote to memory of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 2976 wrote to memory of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 2976 wrote to memory of 3040 2976 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 30 PID 3040 wrote to memory of 2832 3040 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 31 PID 3040 wrote to memory of 2832 3040 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 31 PID 3040 wrote to memory of 2832 3040 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 31 PID 3040 wrote to memory of 2832 3040 89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe 31 PID 2832 wrote to memory of 2460 2832 omsecor.exe 32 PID 2832 wrote to memory of 2460 2832 omsecor.exe 32 PID 2832 wrote to memory of 2460 2832 omsecor.exe 32 PID 2832 wrote to memory of 2460 2832 omsecor.exe 32 PID 2832 wrote to memory of 2460 2832 omsecor.exe 32 PID 2832 wrote to memory of 2460 2832 omsecor.exe 32 PID 2460 wrote to memory of 2092 2460 omsecor.exe 35 PID 2460 wrote to memory of 2092 2460 omsecor.exe 35 PID 2460 wrote to memory of 2092 2460 omsecor.exe 35 PID 2460 wrote to memory of 2092 2460 omsecor.exe 35 PID 2092 wrote to memory of 1288 2092 omsecor.exe 36 PID 2092 wrote to memory of 1288 2092 omsecor.exe 36 PID 2092 wrote to memory of 1288 2092 omsecor.exe 36 PID 2092 wrote to memory of 1288 2092 omsecor.exe 36 PID 2092 wrote to memory of 1288 2092 omsecor.exe 36 PID 2092 wrote to memory of 1288 2092 omsecor.exe 36 PID 1288 wrote to memory of 1144 1288 omsecor.exe 37 PID 1288 wrote to memory of 1144 1288 omsecor.exe 37 PID 1288 wrote to memory of 1144 1288 omsecor.exe 37 PID 1288 wrote to memory of 1144 1288 omsecor.exe 37 PID 1144 wrote to memory of 2860 1144 omsecor.exe 38 PID 1144 wrote to memory of 2860 1144 omsecor.exe 38 PID 1144 wrote to memory of 2860 1144 omsecor.exe 38 PID 1144 wrote to memory of 2860 1144 omsecor.exe 38 PID 1144 wrote to memory of 2860 1144 omsecor.exe 38 PID 1144 wrote to memory of 2860 1144 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe"C:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exeC:\Users\Admin\AppData\Local\Temp\89f0584fdc33316bf1c0e9942879ba5100a533de1809d36ef35e7b964e370b25.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f7b60f870ab2b98757a7117f5e9e0907
SHA10dc739014e9211899dc3f25a45376d3cdd48cc2a
SHA256d6b82630dd26fc3b9e4635a8be2f5c8d9750918b2b36bdb7880bef9d15e9bc8d
SHA512e4ec2b47de1c26e48d1def6a4243eeb1d5162b8a4f480546cb7d9169034bc917b7ac563cf5e4083a3a061af403387d5914178a110df04dedf5790b6d27401691
-
Filesize
96KB
MD59ae7a66c72a4e951e218a9cb633935a2
SHA1b78aa8282064b037adf8e327a984d8ba39b6c962
SHA2562acc161e874e963410fae6c1742cf30b0a304ad24a1eb7f60aca8e0207db35d3
SHA5129a9280d66a94340d53c0664027b9f1a38defa83631ef98fdf16ea6625067252e85f60618f52b01407679409eda0769dd764d5a228a539c08678cc43ccd41fcea
-
Filesize
96KB
MD5370cde29d17592e0eb26ae97edc1e457
SHA12b00d8827df0deeba4b0477c1670ddd638ab8088
SHA256c089018a007239df6c2f700e5db74f0ce9c30dd5279591f5f41400a54c13d58f
SHA51285f708e11cb97e563d80bc7a05a63e811cea340aa9ad4a18b9af516462a6166a96c4feb34b8d9ca8fc0b631d08406d3c08e74f082ba9994f34176cc58ea4e712