Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe
Resource
win7-20240708-en
General
-
Target
fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe
-
Size
96KB
-
MD5
b3ed9190eeb41cfeebf7fe819ebb0500
-
SHA1
0720d3e3de08c0574e391dea8b49bd6ce3b1065b
-
SHA256
fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755
-
SHA512
b6a8d35dc333b4ebb3ab427fbc99612da1a87dbbc23333e564c779ad8824b9420aa415bf8b7c668c0c1710bd9aa17832361bf029d81da3c4d80485a3006ba8c0
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:MGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2940 omsecor.exe 2800 omsecor.exe 1980 omsecor.exe 1640 omsecor.exe 2872 omsecor.exe 2876 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 772 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 772 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 2940 omsecor.exe 2800 omsecor.exe 2800 omsecor.exe 1640 omsecor.exe 1640 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1864 set thread context of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 2940 set thread context of 2800 2940 omsecor.exe 32 PID 1980 set thread context of 1640 1980 omsecor.exe 36 PID 2872 set thread context of 2876 2872 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1864 wrote to memory of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 1864 wrote to memory of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 1864 wrote to memory of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 1864 wrote to memory of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 1864 wrote to memory of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 1864 wrote to memory of 772 1864 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 30 PID 772 wrote to memory of 2940 772 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 31 PID 772 wrote to memory of 2940 772 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 31 PID 772 wrote to memory of 2940 772 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 31 PID 772 wrote to memory of 2940 772 fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe 31 PID 2940 wrote to memory of 2800 2940 omsecor.exe 32 PID 2940 wrote to memory of 2800 2940 omsecor.exe 32 PID 2940 wrote to memory of 2800 2940 omsecor.exe 32 PID 2940 wrote to memory of 2800 2940 omsecor.exe 32 PID 2940 wrote to memory of 2800 2940 omsecor.exe 32 PID 2940 wrote to memory of 2800 2940 omsecor.exe 32 PID 2800 wrote to memory of 1980 2800 omsecor.exe 35 PID 2800 wrote to memory of 1980 2800 omsecor.exe 35 PID 2800 wrote to memory of 1980 2800 omsecor.exe 35 PID 2800 wrote to memory of 1980 2800 omsecor.exe 35 PID 1980 wrote to memory of 1640 1980 omsecor.exe 36 PID 1980 wrote to memory of 1640 1980 omsecor.exe 36 PID 1980 wrote to memory of 1640 1980 omsecor.exe 36 PID 1980 wrote to memory of 1640 1980 omsecor.exe 36 PID 1980 wrote to memory of 1640 1980 omsecor.exe 36 PID 1980 wrote to memory of 1640 1980 omsecor.exe 36 PID 1640 wrote to memory of 2872 1640 omsecor.exe 37 PID 1640 wrote to memory of 2872 1640 omsecor.exe 37 PID 1640 wrote to memory of 2872 1640 omsecor.exe 37 PID 1640 wrote to memory of 2872 1640 omsecor.exe 37 PID 2872 wrote to memory of 2876 2872 omsecor.exe 38 PID 2872 wrote to memory of 2876 2872 omsecor.exe 38 PID 2872 wrote to memory of 2876 2872 omsecor.exe 38 PID 2872 wrote to memory of 2876 2872 omsecor.exe 38 PID 2872 wrote to memory of 2876 2872 omsecor.exe 38 PID 2872 wrote to memory of 2876 2872 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe"C:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exeC:\Users\Admin\AppData\Local\Temp\fa56d5e7d6838bac9dfc8957e606e7a1deec9b03976282baddf6033c7b281755N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD59cfa878691bde324abe95cc30568f05c
SHA16e7904ded78d25ffe0b4356b43e0890bf56a1885
SHA25605daa229b08a67c579709c326d95637ce1dd23112a7137552042673cd2b2d443
SHA5120bf9fccc46d02eda8583534842a0c50aa7d4c007ad2bd14483181468525578e666e6021d02de0a64a02998213760e5febfec08678ae0650667f7e74a81c34913
-
Filesize
96KB
MD5a6364b307b13d4ce8cd62f7c7ff74a11
SHA1458f4ea2159970340e6bc378b5a0e6ed72be8e4b
SHA256f45774f9af0033d33e18279f48d529bfbe3f4faa5d1e715d14031cd654aad3c4
SHA512f587d8c3c65710b460b84b1dde113ba4d04125951c23981f908ba9941fe61dbe9fe6fbc9e8e081d354aefc88b98fa206ddf17b0a3cba15767686cedece7cca73
-
Filesize
96KB
MD56d062e98d742e338c3461a41528fbc46
SHA1bb88735532887254f3e0988d2b6605f9f16d1113
SHA25612d112f193dcdef997c7518b3d0f2713d891040dbd0404b33904e53d1af70d22
SHA512fc440219432210711aaf87baefdde8857dab5452201d6964b27721463949b60dd650ad5a1cc5a927d17adf4a6eb0baf3570205aa222c12b9da6888ee19138ff4