Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe
Resource
win7-20240903-en
General
-
Target
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe
-
Size
134KB
-
MD5
99f410fed3e2f4cd72d4f981b889e7bc
-
SHA1
76b150567a0e0abe420674417fdfb05fd8cef31c
-
SHA256
c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f
-
SHA512
ba78db0e847cef3fed4fa46be2d74809ab8818beee1e1943318ae3121df71dc8edae15ba16d793bdbeeb92e7051e5a8c6d74918e32d06c2219ba0b03e13e8d27
-
SSDEEP
1536:DDfDbhERTatPLTH0NqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwC7l:PiRTeH0NqAW6J6f1tqF6dngNmaZC7Mc
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2512 omsecor.exe 2060 omsecor.exe 1916 omsecor.exe 1696 omsecor.exe 1188 omsecor.exe 1152 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1964 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 1964 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 2512 omsecor.exe 2060 omsecor.exe 2060 omsecor.exe 1696 omsecor.exe 1696 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2236 set thread context of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2512 set thread context of 2060 2512 omsecor.exe 32 PID 1916 set thread context of 1696 1916 omsecor.exe 36 PID 1188 set thread context of 1152 1188 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2236 wrote to memory of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2236 wrote to memory of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2236 wrote to memory of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2236 wrote to memory of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 2236 wrote to memory of 1964 2236 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 30 PID 1964 wrote to memory of 2512 1964 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 1964 wrote to memory of 2512 1964 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 1964 wrote to memory of 2512 1964 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 1964 wrote to memory of 2512 1964 c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe 31 PID 2512 wrote to memory of 2060 2512 omsecor.exe 32 PID 2512 wrote to memory of 2060 2512 omsecor.exe 32 PID 2512 wrote to memory of 2060 2512 omsecor.exe 32 PID 2512 wrote to memory of 2060 2512 omsecor.exe 32 PID 2512 wrote to memory of 2060 2512 omsecor.exe 32 PID 2512 wrote to memory of 2060 2512 omsecor.exe 32 PID 2060 wrote to memory of 1916 2060 omsecor.exe 35 PID 2060 wrote to memory of 1916 2060 omsecor.exe 35 PID 2060 wrote to memory of 1916 2060 omsecor.exe 35 PID 2060 wrote to memory of 1916 2060 omsecor.exe 35 PID 1916 wrote to memory of 1696 1916 omsecor.exe 36 PID 1916 wrote to memory of 1696 1916 omsecor.exe 36 PID 1916 wrote to memory of 1696 1916 omsecor.exe 36 PID 1916 wrote to memory of 1696 1916 omsecor.exe 36 PID 1916 wrote to memory of 1696 1916 omsecor.exe 36 PID 1916 wrote to memory of 1696 1916 omsecor.exe 36 PID 1696 wrote to memory of 1188 1696 omsecor.exe 37 PID 1696 wrote to memory of 1188 1696 omsecor.exe 37 PID 1696 wrote to memory of 1188 1696 omsecor.exe 37 PID 1696 wrote to memory of 1188 1696 omsecor.exe 37 PID 1188 wrote to memory of 1152 1188 omsecor.exe 38 PID 1188 wrote to memory of 1152 1188 omsecor.exe 38 PID 1188 wrote to memory of 1152 1188 omsecor.exe 38 PID 1188 wrote to memory of 1152 1188 omsecor.exe 38 PID 1188 wrote to memory of 1152 1188 omsecor.exe 38 PID 1188 wrote to memory of 1152 1188 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe"C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exeC:\Users\Admin\AppData\Local\Temp\c8636245592636c046a34dc6224d2effd43fd77c55eb698dbad6cee26949e44f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5c75758db5fb480a348601802231f639f
SHA12c98b26b84730a89d2e650885562ee4d7c229d22
SHA25645ba5ab14e3c5157da902d73a444260b5d152eb001ca9ff1e2d58539846f4db1
SHA512ded28fb6215dada1c0c024fa109b8bb9a8ee0f62fb47067598abd9949abcf32c968ea6acfa5f5d2a6a6f3f2ce76966671028ab290c39a62f880b67d9706b319b
-
Filesize
134KB
MD54893d47d7d0b0ca0e2fa6063a30bd7f5
SHA1a6f97e8ba8e19176aa6558f95ddd10f108675742
SHA256e52e1877c131791ab5afa5e9982c807eb7d670c06ac5eff67a228da49118a425
SHA5121d110b8e6ad6d783510490a42acddc1369a53d0651df4b7374181a3a6cea88a37bcfd7b7142646070632bf29dd5f4bf0bd0894072aa55e60f04d32b2c63a36bd
-
Filesize
134KB
MD5cfa8c367dba6bb05732063fe05d29339
SHA1703e969821a806308ad8a6843d241bd3ebfebf36
SHA2564ab830837968fe80797953e1c45c91cc47c517e98bd5831f07d2f56bc5d0ada1
SHA512b7cf4ed0d0ee887c4264a5395a26ad94d4b6a9eb64282284907c6cccb84cf17950ad060436a71b37c4a3e272d9262c4dc74e7a22e3015b7e9aa46c6d4f0c178d