Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe
Resource
win7-20240903-en
General
-
Target
1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe
-
Size
96KB
-
MD5
526f09b131e50e09afbb2e5b581fae60
-
SHA1
5e0a3e5e30de8c5b18165e4ffc15b47e43c07a1e
-
SHA256
1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70
-
SHA512
0635a7aa65177fbcf29c5d3d65c4768ad601d966f1104a917dcb800e79a750e7ba4c141ba2428594a5cea211015df3311a05bd46a1c4904ec12f2018410df793
-
SSDEEP
1536:ynAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:yGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1608 omsecor.exe 1660 omsecor.exe 1052 omsecor.exe 2400 omsecor.exe 1576 omsecor.exe 2020 omsecor.exe -
Loads dropped DLL 8 IoCs
pid Process 1736 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 1736 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 1608 omsecor.exe 1660 omsecor.exe 1660 omsecor.exe 1052 omsecor.exe 2400 omsecor.exe 2400 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2136 set thread context of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 1608 set thread context of 1660 1608 omsecor.exe 30 PID 1052 set thread context of 2400 1052 omsecor.exe 35 PID 1576 set thread context of 2020 1576 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 2136 wrote to memory of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 2136 wrote to memory of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 2136 wrote to memory of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 2136 wrote to memory of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 2136 wrote to memory of 1736 2136 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 28 PID 1736 wrote to memory of 1608 1736 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 29 PID 1736 wrote to memory of 1608 1736 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 29 PID 1736 wrote to memory of 1608 1736 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 29 PID 1736 wrote to memory of 1608 1736 1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe 29 PID 1608 wrote to memory of 1660 1608 omsecor.exe 30 PID 1608 wrote to memory of 1660 1608 omsecor.exe 30 PID 1608 wrote to memory of 1660 1608 omsecor.exe 30 PID 1608 wrote to memory of 1660 1608 omsecor.exe 30 PID 1608 wrote to memory of 1660 1608 omsecor.exe 30 PID 1608 wrote to memory of 1660 1608 omsecor.exe 30 PID 1660 wrote to memory of 1052 1660 omsecor.exe 34 PID 1660 wrote to memory of 1052 1660 omsecor.exe 34 PID 1660 wrote to memory of 1052 1660 omsecor.exe 34 PID 1660 wrote to memory of 1052 1660 omsecor.exe 34 PID 1052 wrote to memory of 2400 1052 omsecor.exe 35 PID 1052 wrote to memory of 2400 1052 omsecor.exe 35 PID 1052 wrote to memory of 2400 1052 omsecor.exe 35 PID 1052 wrote to memory of 2400 1052 omsecor.exe 35 PID 1052 wrote to memory of 2400 1052 omsecor.exe 35 PID 1052 wrote to memory of 2400 1052 omsecor.exe 35 PID 2400 wrote to memory of 1576 2400 omsecor.exe 36 PID 2400 wrote to memory of 1576 2400 omsecor.exe 36 PID 2400 wrote to memory of 1576 2400 omsecor.exe 36 PID 2400 wrote to memory of 1576 2400 omsecor.exe 36 PID 1576 wrote to memory of 2020 1576 omsecor.exe 37 PID 1576 wrote to memory of 2020 1576 omsecor.exe 37 PID 1576 wrote to memory of 2020 1576 omsecor.exe 37 PID 1576 wrote to memory of 2020 1576 omsecor.exe 37 PID 1576 wrote to memory of 2020 1576 omsecor.exe 37 PID 1576 wrote to memory of 2020 1576 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe"C:\Users\Admin\AppData\Local\Temp\1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exeC:\Users\Admin\AppData\Local\Temp\1f258bc13ee7af4278a9f6b79a7885857d0fb89c162bd94507bb78c1c91e8c70N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5fa3117e39b8ed88967b4ca79432ce9a4
SHA17cc5c7e51731b1c1b1a0c25eaf13c7053e453d3c
SHA2564b6a6c6d11b4ba1bb9e0690f2dbcb58e737774e00ea0bf1c7769582b87d63987
SHA5126bbfea8a4d98a6b63487aa81030a1de3b90e60ac8047e16c2f15d7a2893ed98165a2d7f38afae86c7d48c44bbf7b75c86f8285a2887e1284d4487b9c10e0e0c7
-
Filesize
96KB
MD52cefc4efd1d9f316a1d62047de0cfa08
SHA1e90e4a12596df984a8b265574e8d3dc896672243
SHA25668b6db4779bb635930f2def9a03cd73e1cb15407991f34106b0eb218898d9328
SHA5123bdaaeb8ec284db065569f9041a7dbbf33df4198e881bc36dcc155f7072bb320777c2401471138adb36566657b4a42b337d02c08da82b3974ae73b0829a6e19c
-
Filesize
96KB
MD5d9f1fd707f10304b10cb7644821665b5
SHA142048a02b274ed53e246551c2ff28b7dc248ea12
SHA2560bace152e4523e2ec0aaf39f542243886f5fdca8f397114d02da7c030dba646d
SHA51226a564d19bdd6e66f216515e78bd8348c500da14f63287bb056a07b43836ea189a238150cd2a364e85da3c38cef1fa0a13fa20f7db470156f6f406a0e622765c