Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe
Resource
win7-20240903-en
General
-
Target
ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe
-
Size
96KB
-
MD5
bcadd7ede953fb864ee8f439ee7c351c
-
SHA1
11c74f41f410b1ef09c5415932e1987745e2c1ff
-
SHA256
ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965
-
SHA512
6ffc1b7b2255a794109bbe066b454fe78db966230ac045512b234d349d912492125b193575941175c155e13d61319f560c119528661fa1580c090baa241de99f
-
SSDEEP
1536:UnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:UGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1908 omsecor.exe 2704 omsecor.exe 1912 omsecor.exe 1656 omsecor.exe 352 omsecor.exe 2708 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1920 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 1920 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 1908 omsecor.exe 2704 omsecor.exe 2704 omsecor.exe 1656 omsecor.exe 1656 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1964 set thread context of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1908 set thread context of 2704 1908 omsecor.exe 32 PID 1912 set thread context of 1656 1912 omsecor.exe 36 PID 352 set thread context of 2708 352 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1964 wrote to memory of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1964 wrote to memory of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1964 wrote to memory of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1964 wrote to memory of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1964 wrote to memory of 1920 1964 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 30 PID 1920 wrote to memory of 1908 1920 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 31 PID 1920 wrote to memory of 1908 1920 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 31 PID 1920 wrote to memory of 1908 1920 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 31 PID 1920 wrote to memory of 1908 1920 ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe 31 PID 1908 wrote to memory of 2704 1908 omsecor.exe 32 PID 1908 wrote to memory of 2704 1908 omsecor.exe 32 PID 1908 wrote to memory of 2704 1908 omsecor.exe 32 PID 1908 wrote to memory of 2704 1908 omsecor.exe 32 PID 1908 wrote to memory of 2704 1908 omsecor.exe 32 PID 1908 wrote to memory of 2704 1908 omsecor.exe 32 PID 2704 wrote to memory of 1912 2704 omsecor.exe 35 PID 2704 wrote to memory of 1912 2704 omsecor.exe 35 PID 2704 wrote to memory of 1912 2704 omsecor.exe 35 PID 2704 wrote to memory of 1912 2704 omsecor.exe 35 PID 1912 wrote to memory of 1656 1912 omsecor.exe 36 PID 1912 wrote to memory of 1656 1912 omsecor.exe 36 PID 1912 wrote to memory of 1656 1912 omsecor.exe 36 PID 1912 wrote to memory of 1656 1912 omsecor.exe 36 PID 1912 wrote to memory of 1656 1912 omsecor.exe 36 PID 1912 wrote to memory of 1656 1912 omsecor.exe 36 PID 1656 wrote to memory of 352 1656 omsecor.exe 37 PID 1656 wrote to memory of 352 1656 omsecor.exe 37 PID 1656 wrote to memory of 352 1656 omsecor.exe 37 PID 1656 wrote to memory of 352 1656 omsecor.exe 37 PID 352 wrote to memory of 2708 352 omsecor.exe 38 PID 352 wrote to memory of 2708 352 omsecor.exe 38 PID 352 wrote to memory of 2708 352 omsecor.exe 38 PID 352 wrote to memory of 2708 352 omsecor.exe 38 PID 352 wrote to memory of 2708 352 omsecor.exe 38 PID 352 wrote to memory of 2708 352 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe"C:\Users\Admin\AppData\Local\Temp\ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exeC:\Users\Admin\AppData\Local\Temp\ab6aa14e5b2c300254ab78cb709ad3f1a4eede68f99d5273a25873cb0beda965.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53249450dc5889b11e37ee8f4998819eb
SHA183725352fce432ddb519eb3401bce429fab1ad34
SHA25679dce641855a66f15b05afd1f56a8e6a01d5373b05040bca9f72167b02744ce0
SHA512aa649c8e04592fb8a18ec28c9c84dee0f16e3d66b38e61defd85ef99e98712f484a986b0350cc90ce7fcbe459213653517f7e572ce3b8a3eaa49fe70746b9f65
-
Filesize
96KB
MD519ee92a6e19e4003bb49f5f9f239a54e
SHA1ac93d2d42854f88391cb9f5559d7ec5cc5427c0a
SHA256b8840cd7246b9ac5a6b5e893f297e4b0b5e44c99d84b6b32b3509539d3db9869
SHA5127302c2622638fa45659ad16b19c9e9276426148d33cf3ce50d2b6ee499b8f9e2da7835479294e8c72d6e3abe3b5554a7de7cc337fac1cf1d784dbe8d5041e394
-
Filesize
96KB
MD5ce5bdc2b0913f6ac8f0662a923b854b4
SHA1c4953af8ea163410c5e1162307eeb86e7189d62b
SHA256e81a38eb86f52663783fb5eb01ad680ac06965fae6509d7dba22fc97a24820e7
SHA5123cf43a66ca7949b0e2a27e3b0c8c8b8fdb1cc75edb730519995c452b523e2f1c329bf93413c2ac54cd512d4ca095302b326e7b65d0455b08063bb19061995c18