Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
Resource
win7-20241010-en
General
-
Target
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe
-
Size
96KB
-
MD5
d88b3cd30e3f1447bdfac79a08df111f
-
SHA1
a8288bfa23db0157e34e1dd91d9df0256a5eb69f
-
SHA256
4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302
-
SHA512
8655eb41a84c3e8c9fc413fe95f146497e7402c8d2b3342813e537b1b72240597a0191b4e38d1443e79d82770b895dfb870a185e192ab1d9768bd61af55330f5
-
SSDEEP
1536:onAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxb:oGs8cd8eXlYairZYqMddH13b
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2900 omsecor.exe 3044 omsecor.exe 2180 omsecor.exe 1744 omsecor.exe 1148 omsecor.exe 564 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1072 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 1072 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 2900 omsecor.exe 3044 omsecor.exe 3044 omsecor.exe 1744 omsecor.exe 1744 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1996 set thread context of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 2900 set thread context of 3044 2900 omsecor.exe 32 PID 2180 set thread context of 1744 2180 omsecor.exe 36 PID 1148 set thread context of 564 1148 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 1996 wrote to memory of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 1996 wrote to memory of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 1996 wrote to memory of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 1996 wrote to memory of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 1996 wrote to memory of 1072 1996 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 30 PID 1072 wrote to memory of 2900 1072 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 1072 wrote to memory of 2900 1072 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 1072 wrote to memory of 2900 1072 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 1072 wrote to memory of 2900 1072 4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe 31 PID 2900 wrote to memory of 3044 2900 omsecor.exe 32 PID 2900 wrote to memory of 3044 2900 omsecor.exe 32 PID 2900 wrote to memory of 3044 2900 omsecor.exe 32 PID 2900 wrote to memory of 3044 2900 omsecor.exe 32 PID 2900 wrote to memory of 3044 2900 omsecor.exe 32 PID 2900 wrote to memory of 3044 2900 omsecor.exe 32 PID 3044 wrote to memory of 2180 3044 omsecor.exe 35 PID 3044 wrote to memory of 2180 3044 omsecor.exe 35 PID 3044 wrote to memory of 2180 3044 omsecor.exe 35 PID 3044 wrote to memory of 2180 3044 omsecor.exe 35 PID 2180 wrote to memory of 1744 2180 omsecor.exe 36 PID 2180 wrote to memory of 1744 2180 omsecor.exe 36 PID 2180 wrote to memory of 1744 2180 omsecor.exe 36 PID 2180 wrote to memory of 1744 2180 omsecor.exe 36 PID 2180 wrote to memory of 1744 2180 omsecor.exe 36 PID 2180 wrote to memory of 1744 2180 omsecor.exe 36 PID 1744 wrote to memory of 1148 1744 omsecor.exe 37 PID 1744 wrote to memory of 1148 1744 omsecor.exe 37 PID 1744 wrote to memory of 1148 1744 omsecor.exe 37 PID 1744 wrote to memory of 1148 1744 omsecor.exe 37 PID 1148 wrote to memory of 564 1148 omsecor.exe 38 PID 1148 wrote to memory of 564 1148 omsecor.exe 38 PID 1148 wrote to memory of 564 1148 omsecor.exe 38 PID 1148 wrote to memory of 564 1148 omsecor.exe 38 PID 1148 wrote to memory of 564 1148 omsecor.exe 38 PID 1148 wrote to memory of 564 1148 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exeC:\Users\Admin\AppData\Local\Temp\4797e1373fcdb7ea609aaceeaf2c0f78a7e1e21d20b0bb4a045985717b199302.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:564
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5c229ec62f0c068ef88145ac02af6f35d
SHA1a124c8fe0f0b1b5a765543f24db977c460902680
SHA256c4546cbfa69c716d9a6fbeb4f810760aabb69789bd2356cbc3b3df03744182a9
SHA5123b2a7e3a410b50e05f06da3005a804ec3512aea60073de7e65ed19ff2668d962cb704b5e52a951774e4f51a7ea50b1a6ce7de2fda3ae9c2d3b0f529f05d0ec2a
-
Filesize
96KB
MD5a28e34a9a70a158c15db2a40a9193f85
SHA18f9340e7815f4c74d5f6d56811bc48c0007e3b2d
SHA256663c6d9652d4ca9890dfcd3e639827f549e495b0e6f77b6cf78a011cf6d086d4
SHA512e0d7287e23be662e387dbe602f2c59d4ecd7d45aa97145ee2b82c02a1a0915c528dac60e2fc1f68e4f0dbcc88d7f0eb162aff0d5441db48868f287b99f215059
-
Filesize
96KB
MD50a518e6b965e41ca107af5b58d2cd024
SHA1f9445bbd48096f7bae6234ae5588135b9eaabea3
SHA256b1b7abd5d4826662580deee126c4459d138f9ff7f6673de90a207624a959641a
SHA512bd72b21b76f00c5e293692d785c17fb303d4c2cd98c18f165aaf8d523d4bc1a852fc930777c2119d44355cc208efdd702182a6f77868893c310c61371cbe1b96