Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe
Resource
win7-20240903-en
General
-
Target
22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe
-
Size
134KB
-
MD5
91c54ffb27d073dbbf36bfd919a4ee08
-
SHA1
0a100eca495bdc28145bc5183ed5466c8328bc33
-
SHA256
22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1
-
SHA512
6b2e6c9e13d6c79cc740af1737cf5bdb128913c0cc65b999f87f57da9ada5b3706d52298bbebe8907a6aa551f67d8c952cde05b882a620c1f873331fe0b732cf
-
SSDEEP
1536:7DfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:3iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2708 omsecor.exe 2760 omsecor.exe 2664 omsecor.exe 2920 omsecor.exe 1608 omsecor.exe 1260 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2484 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 2484 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 2708 omsecor.exe 2760 omsecor.exe 2760 omsecor.exe 2920 omsecor.exe 2920 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2088 set thread context of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2708 set thread context of 2760 2708 omsecor.exe 32 PID 2664 set thread context of 2920 2664 omsecor.exe 36 PID 1608 set thread context of 1260 1608 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2088 wrote to memory of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2088 wrote to memory of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2088 wrote to memory of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2088 wrote to memory of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2088 wrote to memory of 2484 2088 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 30 PID 2484 wrote to memory of 2708 2484 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 31 PID 2484 wrote to memory of 2708 2484 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 31 PID 2484 wrote to memory of 2708 2484 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 31 PID 2484 wrote to memory of 2708 2484 22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe 31 PID 2708 wrote to memory of 2760 2708 omsecor.exe 32 PID 2708 wrote to memory of 2760 2708 omsecor.exe 32 PID 2708 wrote to memory of 2760 2708 omsecor.exe 32 PID 2708 wrote to memory of 2760 2708 omsecor.exe 32 PID 2708 wrote to memory of 2760 2708 omsecor.exe 32 PID 2708 wrote to memory of 2760 2708 omsecor.exe 32 PID 2760 wrote to memory of 2664 2760 omsecor.exe 35 PID 2760 wrote to memory of 2664 2760 omsecor.exe 35 PID 2760 wrote to memory of 2664 2760 omsecor.exe 35 PID 2760 wrote to memory of 2664 2760 omsecor.exe 35 PID 2664 wrote to memory of 2920 2664 omsecor.exe 36 PID 2664 wrote to memory of 2920 2664 omsecor.exe 36 PID 2664 wrote to memory of 2920 2664 omsecor.exe 36 PID 2664 wrote to memory of 2920 2664 omsecor.exe 36 PID 2664 wrote to memory of 2920 2664 omsecor.exe 36 PID 2664 wrote to memory of 2920 2664 omsecor.exe 36 PID 2920 wrote to memory of 1608 2920 omsecor.exe 37 PID 2920 wrote to memory of 1608 2920 omsecor.exe 37 PID 2920 wrote to memory of 1608 2920 omsecor.exe 37 PID 2920 wrote to memory of 1608 2920 omsecor.exe 37 PID 1608 wrote to memory of 1260 1608 omsecor.exe 38 PID 1608 wrote to memory of 1260 1608 omsecor.exe 38 PID 1608 wrote to memory of 1260 1608 omsecor.exe 38 PID 1608 wrote to memory of 1260 1608 omsecor.exe 38 PID 1608 wrote to memory of 1260 1608 omsecor.exe 38 PID 1608 wrote to memory of 1260 1608 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe"C:\Users\Admin\AppData\Local\Temp\22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exeC:\Users\Admin\AppData\Local\Temp\22dbaffae0785ce8ad3c71bc4b45dfa82c89dabd08bac68733b46e2f5e3281d1.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1260
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ef00f4a3f8857b9c8cfadfe3e7c491e9
SHA1e7046fb93321820d14a6fed9d743407b3298983b
SHA256047fec3c7d43a79f624f165afffab46b56c325265b7bd41bc3ed582968429aa8
SHA5128c647caeb3ea7582c467e6102adfed6d738013fee7cf60316824ccac85e4151b8b213f2cca9b6349fc86c1edbfab7f3388e0c570e7984fa918a3c76942de1adc
-
Filesize
134KB
MD51c308e7def513112b25cc9bc6bae6f58
SHA1257bbf7545708cc9c791d17160255f8a538452bb
SHA25674e17db4a910b2aa6da337c663de8de1e7a3c93f3a6e804b01ae1318ddddd534
SHA5124a1fda2f250df3fc001d52ec0c68dda8e7f1bb4e9b0ec7c23baa3d1abcbfdf32d9b52c57fe75ee90e69ec8d523d2b37d05232ee52c9a9e3467d887a7d8d08540
-
Filesize
134KB
MD57aca28584e5fd9f92203e7f042470818
SHA10440b68ce8cccc10c2e1e9d266776dcd715c8abe
SHA256888271ff8c7283e35b14000d2c5624975ed56cb353ffb9d15b25496d985b5a42
SHA512206289c3bead09c555857ba9cad561e5671e79622ae532dec24219f037f68d65f8a0d102998683468676a4eceace273072607b4d1115abe1b92567b8af469b7a