Analysis
-
max time kernel
115s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
Resource
win7-20240903-en
General
-
Target
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
-
Size
96KB
-
MD5
d88b3cd30e3f1447bdfac79a08df111f
-
SHA1
a8288bfa23db0157e34e1dd91d9df0256a5eb69f
-
SHA256
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302
-
SHA512
8655eb41a84c3e8c9fc413fe95f146497e7402c8d2b3342813e537b1b72240597a0191b4e38d1443e79d82770b895dfb870a185e192ab1d9768bd61af55330f5
-
SSDEEP
1536:onAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:oGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2412 omsecor.exe 1032 omsecor.exe 2508 omsecor.exe 2844 omsecor.exe 1560 omsecor.exe 3028 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2592 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 2592 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 2412 omsecor.exe 1032 omsecor.exe 1032 omsecor.exe 2844 omsecor.exe 2844 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2400 set thread context of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2412 set thread context of 1032 2412 omsecor.exe 32 PID 2508 set thread context of 2844 2508 omsecor.exe 36 PID 1560 set thread context of 3028 1560 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2400 wrote to memory of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2400 wrote to memory of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2400 wrote to memory of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2400 wrote to memory of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2400 wrote to memory of 2592 2400 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2592 wrote to memory of 2412 2592 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 2592 wrote to memory of 2412 2592 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 2592 wrote to memory of 2412 2592 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 2592 wrote to memory of 2412 2592 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 2412 wrote to memory of 1032 2412 omsecor.exe 32 PID 2412 wrote to memory of 1032 2412 omsecor.exe 32 PID 2412 wrote to memory of 1032 2412 omsecor.exe 32 PID 2412 wrote to memory of 1032 2412 omsecor.exe 32 PID 2412 wrote to memory of 1032 2412 omsecor.exe 32 PID 2412 wrote to memory of 1032 2412 omsecor.exe 32 PID 1032 wrote to memory of 2508 1032 omsecor.exe 35 PID 1032 wrote to memory of 2508 1032 omsecor.exe 35 PID 1032 wrote to memory of 2508 1032 omsecor.exe 35 PID 1032 wrote to memory of 2508 1032 omsecor.exe 35 PID 2508 wrote to memory of 2844 2508 omsecor.exe 36 PID 2508 wrote to memory of 2844 2508 omsecor.exe 36 PID 2508 wrote to memory of 2844 2508 omsecor.exe 36 PID 2508 wrote to memory of 2844 2508 omsecor.exe 36 PID 2508 wrote to memory of 2844 2508 omsecor.exe 36 PID 2508 wrote to memory of 2844 2508 omsecor.exe 36 PID 2844 wrote to memory of 1560 2844 omsecor.exe 37 PID 2844 wrote to memory of 1560 2844 omsecor.exe 37 PID 2844 wrote to memory of 1560 2844 omsecor.exe 37 PID 2844 wrote to memory of 1560 2844 omsecor.exe 37 PID 1560 wrote to memory of 3028 1560 omsecor.exe 38 PID 1560 wrote to memory of 3028 1560 omsecor.exe 38 PID 1560 wrote to memory of 3028 1560 omsecor.exe 38 PID 1560 wrote to memory of 3028 1560 omsecor.exe 38 PID 1560 wrote to memory of 3028 1560 omsecor.exe 38 PID 1560 wrote to memory of 3028 1560 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exeC:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c229ec62f0c068ef88145ac02af6f35d
SHA1a124c8fe0f0b1b5a765543f24db977c460902680
SHA256c4546cbfa69c716d9a6fbeb4f810760aabb69789bd2356cbc3b3df03744182a9
SHA5123b2a7e3a410b50e05f06da3005a804ec3512aea60073de7e65ed19ff2668d962cb704b5e52a951774e4f51a7ea50b1a6ce7de2fda3ae9c2d3b0f529f05d0ec2a
-
Filesize
96KB
MD594cb6bf1496dc22100d63514da2e74be
SHA1aba3efc97e4a487bb1f907230c925d8ac12e3f4a
SHA25657308cbbaf4eef76dbc255f42e028e8de5468c3fd9e5aa6bb63fa4a85ee61948
SHA51270c9904498e7138a8ac9327288a2b39d4b472bbc71113993fed1e88aeee42c2e369d94ef540a3e0d93e8f12ddbb1a15a382c536a089b9f4565f799b2def7e5be
-
Filesize
96KB
MD5d2a9cb67dc9cf7221b48a9c59c01eacc
SHA16c7e93a61963df1c84ee05851dd555ad56103c3c
SHA256a517b9675eeb80a84104cf50a515fe35b3eaa4480b6078995f58c7292cf447b7
SHA5123ff23322ef35b62ca74a2dd2914056e4bddf51e9c841690872afcdaff2c1040fb0d1a91edc2e1bb571b678a9f1b07445a4aec33227409343e7efb439bc0af9ad