Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
Resource
win7-20240708-en
General
-
Target
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe
-
Size
96KB
-
MD5
efc206b3300e3e58bcf3ca8eaca8c9cf
-
SHA1
712605a02fb689f2191342e67cb902ad52556c51
-
SHA256
7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d
-
SHA512
94f0162cc032d7a8ed0924037168222936d9daeba5bd4b015850fb8c1057fd841e0cc702fd5a5c33fa02e05dca8d6977565c0482615c9a6129185f23c8d95399
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:UGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2636 omsecor.exe 2076 omsecor.exe 1644 omsecor.exe 2004 omsecor.exe 1732 omsecor.exe 1936 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3056 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 3056 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 2636 omsecor.exe 2076 omsecor.exe 2076 omsecor.exe 2004 omsecor.exe 2004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2972 set thread context of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 2636 set thread context of 2076 2636 omsecor.exe 32 PID 1644 set thread context of 2004 1644 omsecor.exe 36 PID 1732 set thread context of 1936 1732 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2972 wrote to memory of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 2972 wrote to memory of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 2972 wrote to memory of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 2972 wrote to memory of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 2972 wrote to memory of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 2972 wrote to memory of 3056 2972 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 30 PID 3056 wrote to memory of 2636 3056 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 31 PID 3056 wrote to memory of 2636 3056 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 31 PID 3056 wrote to memory of 2636 3056 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 31 PID 3056 wrote to memory of 2636 3056 7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe 31 PID 2636 wrote to memory of 2076 2636 omsecor.exe 32 PID 2636 wrote to memory of 2076 2636 omsecor.exe 32 PID 2636 wrote to memory of 2076 2636 omsecor.exe 32 PID 2636 wrote to memory of 2076 2636 omsecor.exe 32 PID 2636 wrote to memory of 2076 2636 omsecor.exe 32 PID 2636 wrote to memory of 2076 2636 omsecor.exe 32 PID 2076 wrote to memory of 1644 2076 omsecor.exe 35 PID 2076 wrote to memory of 1644 2076 omsecor.exe 35 PID 2076 wrote to memory of 1644 2076 omsecor.exe 35 PID 2076 wrote to memory of 1644 2076 omsecor.exe 35 PID 1644 wrote to memory of 2004 1644 omsecor.exe 36 PID 1644 wrote to memory of 2004 1644 omsecor.exe 36 PID 1644 wrote to memory of 2004 1644 omsecor.exe 36 PID 1644 wrote to memory of 2004 1644 omsecor.exe 36 PID 1644 wrote to memory of 2004 1644 omsecor.exe 36 PID 1644 wrote to memory of 2004 1644 omsecor.exe 36 PID 2004 wrote to memory of 1732 2004 omsecor.exe 37 PID 2004 wrote to memory of 1732 2004 omsecor.exe 37 PID 2004 wrote to memory of 1732 2004 omsecor.exe 37 PID 2004 wrote to memory of 1732 2004 omsecor.exe 37 PID 1732 wrote to memory of 1936 1732 omsecor.exe 38 PID 1732 wrote to memory of 1936 1732 omsecor.exe 38 PID 1732 wrote to memory of 1936 1732 omsecor.exe 38 PID 1732 wrote to memory of 1936 1732 omsecor.exe 38 PID 1732 wrote to memory of 1936 1732 omsecor.exe 38 PID 1732 wrote to memory of 1936 1732 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exeC:\Users\Admin\AppData\Local\Temp\7801f94d7d50a919b92278c053132294bb0e88262ad2800ad0ff773ec3681d0d.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f68ee74f31d1013e365ab5ce17f6a80d
SHA1855a9adb872d0e86afa7bcc5644d9cd1d504cd88
SHA2561d2e864b46c759be0946582d45a2b72e2020b7246469abdc96cb9fea7b4df94c
SHA5123d7acd7c613c2a5185132ba5388da33be1532302565d8e2a80deee6d28bb5edf72550ee299ea9db312a24311cb139c410bd7d3ccf02c705adffab99650f46194
-
Filesize
96KB
MD573efedc6eacc6ddb5c1189645da57037
SHA135e99145d30919e8100319edb4f60c75a4d6352e
SHA25657445dcd339e440802b30eee0b60d2758639e5b2c0385dece81546f1f9fe0117
SHA5128888e3134648429c13af131d8735bcaf8ae10e77d073fda6759bdee42a1ba99e2c7016b8861c2ad4bbac50bbe47014a8b8e9ba9334304d2c0f82ef3e92f355dc
-
Filesize
96KB
MD5ce94d179891e1f29cfb57e7e976d328b
SHA1e6a2f8cb66b3818cb35228efe79e015ec9133814
SHA2566dc810d7ea7c6ac0e42597cead65dfd91e1de2559cb44b5778f10f8670042ce8
SHA5123cbb03aceed7345198ea46cc3255204d6a7f324c315edeb65ba14477905c1adb508a4dad7af4ad88de95d04fffe43d1583ca9eab3c2e0ca5ebd3764b66fe1068