Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe
Resource
win7-20240903-en
General
-
Target
1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe
-
Size
134KB
-
MD5
9e1819eedab3513d2b838dfec76000a0
-
SHA1
aa5d7cb394186c042f3e06eae176f5bf0af8a933
-
SHA256
1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99
-
SHA512
3c556e7651560e3651c8bff3aa156c226abe95a2dc13370e3fc300b9c3f7423d00e359f276ca5616901b6ad54af8f6d37ecdbee0970162002a42860b855ae057
-
SSDEEP
1536:KDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:siRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2668 omsecor.exe 2868 omsecor.exe 1308 omsecor.exe 2988 omsecor.exe 2124 omsecor.exe 1176 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2828 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 2828 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 2668 omsecor.exe 2868 omsecor.exe 2868 omsecor.exe 2988 omsecor.exe 2988 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2708 set thread context of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2668 set thread context of 2868 2668 omsecor.exe 32 PID 1308 set thread context of 2988 1308 omsecor.exe 36 PID 2124 set thread context of 1176 2124 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2708 wrote to memory of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2708 wrote to memory of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2708 wrote to memory of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2708 wrote to memory of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2708 wrote to memory of 2828 2708 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 30 PID 2828 wrote to memory of 2668 2828 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 31 PID 2828 wrote to memory of 2668 2828 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 31 PID 2828 wrote to memory of 2668 2828 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 31 PID 2828 wrote to memory of 2668 2828 1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe 31 PID 2668 wrote to memory of 2868 2668 omsecor.exe 32 PID 2668 wrote to memory of 2868 2668 omsecor.exe 32 PID 2668 wrote to memory of 2868 2668 omsecor.exe 32 PID 2668 wrote to memory of 2868 2668 omsecor.exe 32 PID 2668 wrote to memory of 2868 2668 omsecor.exe 32 PID 2668 wrote to memory of 2868 2668 omsecor.exe 32 PID 2868 wrote to memory of 1308 2868 omsecor.exe 35 PID 2868 wrote to memory of 1308 2868 omsecor.exe 35 PID 2868 wrote to memory of 1308 2868 omsecor.exe 35 PID 2868 wrote to memory of 1308 2868 omsecor.exe 35 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 1308 wrote to memory of 2988 1308 omsecor.exe 36 PID 2988 wrote to memory of 2124 2988 omsecor.exe 37 PID 2988 wrote to memory of 2124 2988 omsecor.exe 37 PID 2988 wrote to memory of 2124 2988 omsecor.exe 37 PID 2988 wrote to memory of 2124 2988 omsecor.exe 37 PID 2124 wrote to memory of 1176 2124 omsecor.exe 38 PID 2124 wrote to memory of 1176 2124 omsecor.exe 38 PID 2124 wrote to memory of 1176 2124 omsecor.exe 38 PID 2124 wrote to memory of 1176 2124 omsecor.exe 38 PID 2124 wrote to memory of 1176 2124 omsecor.exe 38 PID 2124 wrote to memory of 1176 2124 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe"C:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exeC:\Users\Admin\AppData\Local\Temp\1e9ca37646c0b527ce04a0b28dacb158bb1625f05249dba0570d9c40ec9e3b99N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1176
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a20a11e17973bcf9f9ff3a841eb9e80d
SHA19c7bddb753d5b5bd000bb31d60e972d795664ff7
SHA256b447bd6f12253dcbd529299aece48b11972212ed15f1262489431b4d35957f60
SHA5129525ee123b79d87da37a6c70852dd1955228c1cca76ec38570586c76b366a98143f44d6792b4053cc12374a49279ec9fb74fcb671dc7845fd002f9b3daddd67e
-
Filesize
134KB
MD578c79b32a1102009f91f23e44059561e
SHA1827f522c19b36974ebe6f461315465de9b12ad88
SHA2563b936c4587ae6b36f10faaff42729dd0a89c25a1cb39330a3a0615f53e78de8e
SHA51207514320548990eb9ba56fe3f295db4b157b17f69812d8f0038f57ec2a94a414189eb5bb655c56ee74ff08d23b5971ad0b6dd2cb1476a0e18dd842b89d2c7cdb
-
Filesize
134KB
MD54e548fc70324505600126440c058a639
SHA150318142e191e4b295040d17fdd66691cde9658b
SHA256647b0030dbf3c029646224fa498322423f427ad357b4fa1d3e11305f866e6afa
SHA5122a1eb6d32c6c0e6c77750c203282bb81f5b065e7a367e3a4e894c7eb2d8a43a8a21f1c216cda03f7c4f8a8408957c3e87df205e48df882808531bc925c423ae1