Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe
Resource
win7-20240903-en
General
-
Target
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe
-
Size
134KB
-
MD5
99f410fed3e2f4cd72d4f981b889e7bc
-
SHA1
76b150567a0e0abe420674417fdfb05fd8cef31c
-
SHA256
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f
-
SHA512
ba78db0e847cef3fed4fa46be2d74809ab8818beee1e1943318ae3121df71dc8edae15ba16d793bdbeeb92e7051e5a8c6d74918e32d06c2219ba0b03e13e8d27
-
SSDEEP
1536:DDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7l:PiRTeH0NqAW6J6f1tqF6dngNmaZC7Mc
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2672 omsecor.exe 1872 omsecor.exe 3048 omsecor.exe 1976 omsecor.exe 2656 omsecor.exe 2232 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2116 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 2116 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 2672 omsecor.exe 1872 omsecor.exe 1872 omsecor.exe 1976 omsecor.exe 1976 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2380 set thread context of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2672 set thread context of 1872 2672 omsecor.exe 32 PID 3048 set thread context of 1976 3048 omsecor.exe 36 PID 2656 set thread context of 2232 2656 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2380 wrote to memory of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2380 wrote to memory of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2380 wrote to memory of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2380 wrote to memory of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2380 wrote to memory of 2116 2380 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2116 wrote to memory of 2672 2116 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 2116 wrote to memory of 2672 2116 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 2116 wrote to memory of 2672 2116 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 2116 wrote to memory of 2672 2116 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 2672 wrote to memory of 1872 2672 omsecor.exe 32 PID 2672 wrote to memory of 1872 2672 omsecor.exe 32 PID 2672 wrote to memory of 1872 2672 omsecor.exe 32 PID 2672 wrote to memory of 1872 2672 omsecor.exe 32 PID 2672 wrote to memory of 1872 2672 omsecor.exe 32 PID 2672 wrote to memory of 1872 2672 omsecor.exe 32 PID 1872 wrote to memory of 3048 1872 omsecor.exe 35 PID 1872 wrote to memory of 3048 1872 omsecor.exe 35 PID 1872 wrote to memory of 3048 1872 omsecor.exe 35 PID 1872 wrote to memory of 3048 1872 omsecor.exe 35 PID 3048 wrote to memory of 1976 3048 omsecor.exe 36 PID 3048 wrote to memory of 1976 3048 omsecor.exe 36 PID 3048 wrote to memory of 1976 3048 omsecor.exe 36 PID 3048 wrote to memory of 1976 3048 omsecor.exe 36 PID 3048 wrote to memory of 1976 3048 omsecor.exe 36 PID 3048 wrote to memory of 1976 3048 omsecor.exe 36 PID 1976 wrote to memory of 2656 1976 omsecor.exe 37 PID 1976 wrote to memory of 2656 1976 omsecor.exe 37 PID 1976 wrote to memory of 2656 1976 omsecor.exe 37 PID 1976 wrote to memory of 2656 1976 omsecor.exe 37 PID 2656 wrote to memory of 2232 2656 omsecor.exe 38 PID 2656 wrote to memory of 2232 2656 omsecor.exe 38 PID 2656 wrote to memory of 2232 2656 omsecor.exe 38 PID 2656 wrote to memory of 2232 2656 omsecor.exe 38 PID 2656 wrote to memory of 2232 2656 omsecor.exe 38 PID 2656 wrote to memory of 2232 2656 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe"C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exeC:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5c75758db5fb480a348601802231f639f
SHA12c98b26b84730a89d2e650885562ee4d7c229d22
SHA25645ba5ab14e3c5157da902d73a444260b5d152eb001ca9ff1e2d58539846f4db1
SHA512ded28fb6215dada1c0c024fa109b8bb9a8ee0f62fb47067598abd9949abcf32c968ea6acfa5f5d2a6a6f3f2ce76966671028ab290c39a62f880b67d9706b319b
-
Filesize
134KB
MD55ec24e8073ad369be3151862b6b22306
SHA105034ccd62b548bdfac817f1fbbc9c6839325a9f
SHA25669a33f281a24e99503dcf4db8a9661237c0c003fbf4af4e00b6609a68f658de1
SHA5126eafa71964ce6c9447e4cf802cdfd2e5c48a45cf73fa01fbe44507733fc9fa6e9ab6e32e3f633a82a8358e2b713e7631da7d3cb40ebf245c6515b8bb84e1ebac
-
Filesize
134KB
MD53c33e79ba3dbfc9cfb665c7db7517230
SHA171bf21eafccd7aae1a1e0c2bb0c5279f6321930c
SHA256efcecf160bdd188fdb00aa129384d96107bf76b3d1b5a800efd3e4b16c5f9be0
SHA512f3c3149a90f381cf134318f711ce61933ce2dc678ccf4fd1cec866ca0d7d43b809a1f87d13e903851862e740f5b97893ed63a4ceda3100cbb2b65b2c9612dd6e