Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe
Resource
win7-20241023-en
General
-
Target
7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe
-
Size
134KB
-
MD5
51d01f0d8380c55b4601e419668a181b
-
SHA1
1639ad6d7cd81b6655084c9b8d6f53ae0ecdedb4
-
SHA256
7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5
-
SHA512
cb6dd53b7bd60fe5acbd497f818159e0dc04a4a685347f086f759f1ab6e572496dae11fdd9e4e9c83a15b13e8787aff33a49be8397c539f1a3f97c9aef2841c6
-
SSDEEP
1536:fDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCiH:LiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 320 omsecor.exe 2172 omsecor.exe 3008 omsecor.exe 1296 omsecor.exe 2260 omsecor.exe 1700 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2080 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 2080 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 320 omsecor.exe 2172 omsecor.exe 2172 omsecor.exe 1296 omsecor.exe 1296 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2360 set thread context of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 320 set thread context of 2172 320 omsecor.exe 33 PID 3008 set thread context of 1296 3008 omsecor.exe 37 PID 2260 set thread context of 1700 2260 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 2360 wrote to memory of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 2360 wrote to memory of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 2360 wrote to memory of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 2360 wrote to memory of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 2360 wrote to memory of 2080 2360 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 31 PID 2080 wrote to memory of 320 2080 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 32 PID 2080 wrote to memory of 320 2080 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 32 PID 2080 wrote to memory of 320 2080 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 32 PID 2080 wrote to memory of 320 2080 7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe 32 PID 320 wrote to memory of 2172 320 omsecor.exe 33 PID 320 wrote to memory of 2172 320 omsecor.exe 33 PID 320 wrote to memory of 2172 320 omsecor.exe 33 PID 320 wrote to memory of 2172 320 omsecor.exe 33 PID 320 wrote to memory of 2172 320 omsecor.exe 33 PID 320 wrote to memory of 2172 320 omsecor.exe 33 PID 2172 wrote to memory of 3008 2172 omsecor.exe 36 PID 2172 wrote to memory of 3008 2172 omsecor.exe 36 PID 2172 wrote to memory of 3008 2172 omsecor.exe 36 PID 2172 wrote to memory of 3008 2172 omsecor.exe 36 PID 3008 wrote to memory of 1296 3008 omsecor.exe 37 PID 3008 wrote to memory of 1296 3008 omsecor.exe 37 PID 3008 wrote to memory of 1296 3008 omsecor.exe 37 PID 3008 wrote to memory of 1296 3008 omsecor.exe 37 PID 3008 wrote to memory of 1296 3008 omsecor.exe 37 PID 3008 wrote to memory of 1296 3008 omsecor.exe 37 PID 1296 wrote to memory of 2260 1296 omsecor.exe 38 PID 1296 wrote to memory of 2260 1296 omsecor.exe 38 PID 1296 wrote to memory of 2260 1296 omsecor.exe 38 PID 1296 wrote to memory of 2260 1296 omsecor.exe 38 PID 2260 wrote to memory of 1700 2260 omsecor.exe 39 PID 2260 wrote to memory of 1700 2260 omsecor.exe 39 PID 2260 wrote to memory of 1700 2260 omsecor.exe 39 PID 2260 wrote to memory of 1700 2260 omsecor.exe 39 PID 2260 wrote to memory of 1700 2260 omsecor.exe 39 PID 2260 wrote to memory of 1700 2260 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe"C:\Users\Admin\AppData\Local\Temp\7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exeC:\Users\Admin\AppData\Local\Temp\7bd63f0ea0fbfa0e7b6f68d2e026dfb71e8e278e316723fea0fc4f6ca32475e5.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f180fe8ee40f3716afd0c18ae0cf8b00
SHA1f590ac1f509bc38bb3fdde5a8a2ea84fcd7d8e2e
SHA256b84244ca9ea6ef79c2353adbe104b77670fd7cf86503b7b2cf1bcfaf0e968b87
SHA512e9fa6e103e97d068d22ea0169860b1dbd02457052829a18d0d95b16de9937aa9b9c9f7ef7e3f43387f1112d3ef083c15977dd49109feab9ff3a634e225f60ecc
-
Filesize
134KB
MD57dd40a1918db43357c06f5d7f26d4a56
SHA1db32032ed27879c7c2039b73912b29bf6a9a8a6b
SHA256a9335714946eef277dae69c61dda8f771fabc1ad7caf0465832b31385f9490cd
SHA51208fada8663c36cc2c1047afda35602289ebb08dffd98a7a83f5215af28f7f325fdc6b4dc5d463b94820a2f5f8520bbae3ce5f1be611e7345815286f17fb2f2aa
-
Filesize
134KB
MD5d2bfa54406c983297fdd1411112b92c3
SHA1984a7dbacfd1ee4fb7c2fa885b502398e6f87635
SHA25682e1124080f7caedb1ab0e99657b62202a885ac63b2aa74f76f4a24a1aba2cda
SHA5126b6d90ad2dc8fd8e4feead8296f85245ee152d7d091eb1d9e1d9a05988c470773f84bf2d989819f91d69753c7ad78e41a0c13d6b7f1ae180b3ce7dd165cbceb4