Analysis
-
max time kernel
116s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe
Resource
win7-20241010-en
General
-
Target
e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe
-
Size
96KB
-
MD5
e7b21e143f78b089835bb83b0d883cd3
-
SHA1
b7dcac827c045891b15108cc070b14e40d4defa0
-
SHA256
e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b
-
SHA512
e3df15543382a0bfad4907ab39921afcad4eb31d82195fcdc2b97bad1c18ac3e4b970cd65f1dd32a62126e3869293bb4d8cf915f6cc6c8cd2cc4925d41c77b74
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxx7:MGs8cd8eXlYairZYqMddH137
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2968 omsecor.exe 2856 omsecor.exe 3032 omsecor.exe 2420 omsecor.exe 1932 omsecor.exe 2252 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 3000 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 3000 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 2968 omsecor.exe 2856 omsecor.exe 2856 omsecor.exe 2420 omsecor.exe 2420 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2592 set thread context of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 2968 set thread context of 2856 2968 omsecor.exe 32 PID 3032 set thread context of 2420 3032 omsecor.exe 35 PID 1932 set thread context of 2252 1932 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2592 wrote to memory of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 2592 wrote to memory of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 2592 wrote to memory of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 2592 wrote to memory of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 2592 wrote to memory of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 2592 wrote to memory of 3000 2592 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 30 PID 3000 wrote to memory of 2968 3000 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 31 PID 3000 wrote to memory of 2968 3000 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 31 PID 3000 wrote to memory of 2968 3000 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 31 PID 3000 wrote to memory of 2968 3000 e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe 31 PID 2968 wrote to memory of 2856 2968 omsecor.exe 32 PID 2968 wrote to memory of 2856 2968 omsecor.exe 32 PID 2968 wrote to memory of 2856 2968 omsecor.exe 32 PID 2968 wrote to memory of 2856 2968 omsecor.exe 32 PID 2968 wrote to memory of 2856 2968 omsecor.exe 32 PID 2968 wrote to memory of 2856 2968 omsecor.exe 32 PID 2856 wrote to memory of 3032 2856 omsecor.exe 34 PID 2856 wrote to memory of 3032 2856 omsecor.exe 34 PID 2856 wrote to memory of 3032 2856 omsecor.exe 34 PID 2856 wrote to memory of 3032 2856 omsecor.exe 34 PID 3032 wrote to memory of 2420 3032 omsecor.exe 35 PID 3032 wrote to memory of 2420 3032 omsecor.exe 35 PID 3032 wrote to memory of 2420 3032 omsecor.exe 35 PID 3032 wrote to memory of 2420 3032 omsecor.exe 35 PID 3032 wrote to memory of 2420 3032 omsecor.exe 35 PID 3032 wrote to memory of 2420 3032 omsecor.exe 35 PID 2420 wrote to memory of 1932 2420 omsecor.exe 36 PID 2420 wrote to memory of 1932 2420 omsecor.exe 36 PID 2420 wrote to memory of 1932 2420 omsecor.exe 36 PID 2420 wrote to memory of 1932 2420 omsecor.exe 36 PID 1932 wrote to memory of 2252 1932 omsecor.exe 37 PID 1932 wrote to memory of 2252 1932 omsecor.exe 37 PID 1932 wrote to memory of 2252 1932 omsecor.exe 37 PID 1932 wrote to memory of 2252 1932 omsecor.exe 37 PID 1932 wrote to memory of 2252 1932 omsecor.exe 37 PID 1932 wrote to memory of 2252 1932 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe"C:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exeC:\Users\Admin\AppData\Local\Temp\e87a33f1888aedfb70f3158b0612a43d38bc5246baa68f9bd99f3b2f29811d5b.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD536088bd70dbd9ff006f88a09ad20574a
SHA1349126253b15e9568a466c5fe5cf4cd86821c7ef
SHA2569ad15eb7382692405237767c0813bb429ba955884898505e2b5b9e8c2cb6d532
SHA51276227c0ca1d9a14cd67c04f385d304751df05d0f79a9e720c5b198c6ba43af3e23c2a7b178503aed85c1f329b4984229dc8ce72af49caea57b09b6c61a58d1ff
-
Filesize
96KB
MD5585c4c9ea357839b6a04a1f249825846
SHA155710355c7a2262982cfb6ea516d97f848f75579
SHA256324a22efaf6c5d5a293c5a0bc0637fa33d24ce9977e5a9745d4814b645c4750b
SHA5128d73a9befb3021da72acac21087fa8bccc11caccc60e974732c0dc994ad4106262ae7bc90e89632bb8f43df3d643296999da0d4641199eb891b36b15082aca36
-
Filesize
96KB
MD580b075081a9790f43142aeaa5b3ab422
SHA1ebb1616cfa13fbbead41c7f566b9db5f22629314
SHA25699cf3113dd934a37c3754456ceacbd95a6f11fcb64c57876587ef763349db10f
SHA5128d5dd6019e7a9399094679b4dec09f68712853023d25f93d41b0daf3765b10c0644ef650d77ccc2c170a9fbf776cd99771cceedbc9f9a3c0eee891e8d98e75bc