Analysis
-
max time kernel
120s -
max time network
114s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe
Resource
win7-20240903-en
General
-
Target
1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe
-
Size
96KB
-
MD5
b67bf83c78ed65549a8d17207df21650
-
SHA1
2555a01e772fd1f349128cf6e3daf275792885c7
-
SHA256
1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7
-
SHA512
2664132b45f60357d2bd93689caf16c2123af1b86683228f08cf249ea8f82d774b8a2c94785cf37fb811de51265195c1ed358444f61ab29441246787c77a1006
-
SSDEEP
1536:QnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:QGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2480 omsecor.exe 2932 omsecor.exe 1580 omsecor.exe 2364 omsecor.exe 2072 omsecor.exe 2800 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1888 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 1888 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 2480 omsecor.exe 2932 omsecor.exe 2932 omsecor.exe 2364 omsecor.exe 2364 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2336 set thread context of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 2480 set thread context of 2932 2480 omsecor.exe 32 PID 1580 set thread context of 2364 1580 omsecor.exe 36 PID 2072 set thread context of 2800 2072 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 2336 wrote to memory of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 2336 wrote to memory of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 2336 wrote to memory of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 2336 wrote to memory of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 2336 wrote to memory of 1888 2336 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 30 PID 1888 wrote to memory of 2480 1888 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 31 PID 1888 wrote to memory of 2480 1888 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 31 PID 1888 wrote to memory of 2480 1888 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 31 PID 1888 wrote to memory of 2480 1888 1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe 31 PID 2480 wrote to memory of 2932 2480 omsecor.exe 32 PID 2480 wrote to memory of 2932 2480 omsecor.exe 32 PID 2480 wrote to memory of 2932 2480 omsecor.exe 32 PID 2480 wrote to memory of 2932 2480 omsecor.exe 32 PID 2480 wrote to memory of 2932 2480 omsecor.exe 32 PID 2480 wrote to memory of 2932 2480 omsecor.exe 32 PID 2932 wrote to memory of 1580 2932 omsecor.exe 35 PID 2932 wrote to memory of 1580 2932 omsecor.exe 35 PID 2932 wrote to memory of 1580 2932 omsecor.exe 35 PID 2932 wrote to memory of 1580 2932 omsecor.exe 35 PID 1580 wrote to memory of 2364 1580 omsecor.exe 36 PID 1580 wrote to memory of 2364 1580 omsecor.exe 36 PID 1580 wrote to memory of 2364 1580 omsecor.exe 36 PID 1580 wrote to memory of 2364 1580 omsecor.exe 36 PID 1580 wrote to memory of 2364 1580 omsecor.exe 36 PID 1580 wrote to memory of 2364 1580 omsecor.exe 36 PID 2364 wrote to memory of 2072 2364 omsecor.exe 37 PID 2364 wrote to memory of 2072 2364 omsecor.exe 37 PID 2364 wrote to memory of 2072 2364 omsecor.exe 37 PID 2364 wrote to memory of 2072 2364 omsecor.exe 37 PID 2072 wrote to memory of 2800 2072 omsecor.exe 38 PID 2072 wrote to memory of 2800 2072 omsecor.exe 38 PID 2072 wrote to memory of 2800 2072 omsecor.exe 38 PID 2072 wrote to memory of 2800 2072 omsecor.exe 38 PID 2072 wrote to memory of 2800 2072 omsecor.exe 38 PID 2072 wrote to memory of 2800 2072 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe"C:\Users\Admin\AppData\Local\Temp\1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exeC:\Users\Admin\AppData\Local\Temp\1fb13eb3c72f0d3fd6499b2730c9f0e6dd2c2502a5575ba7a2e554ca368476c7N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b19a446c42de54a24fa45c77f6e4ee7e
SHA12e83e343feee767331777ff4cfc886c0a23e6572
SHA2560a47fad86b36ecbabd313364dd6362980876513ab1a33fb3fd09a360287e0fc3
SHA5120f34b001797243ee88c29f3206ae4a472465374614e4f29132014324a0a4d41f2bb7041aabacd5ab4778b7fcd44754a841ff78b2174257a293e1d594273fb419
-
Filesize
96KB
MD5dec22baa50cee1da4c1626dc86950692
SHA1d1eeb6e8cd20a1f6091eab555a2b16164cd25503
SHA2561b2334a8d60b5651077454caad68d43ba97c13b6d1e5bc6cdf89cd94584dcc5d
SHA512860ffef80de42c4aadf1d4fab347b6adb949927e67782d706934b2a6d06ed2751d57a6c2d346af844f9eb10da78a1592804aaaa0426c89d039a4b3a323b87b2e
-
Filesize
96KB
MD55d13abdf51603de5beb1faa3160d2297
SHA1ce38faee10138d9d8591293affddd37ba139ac56
SHA2560c5c1ff6bfd1a84caa021c6bd3439cff2848edc5942f635ef20a145939d8630d
SHA512c8805bff9c0e049bdcc3ce037b01105fc24d358ddb8ee5d73de0161b3874633143801dc48406d38d8d0a4ff9fe06a5661afc04319dbea4fbb445810f5267cfc2