Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe
Resource
win7-20240903-en
General
-
Target
c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe
-
Size
96KB
-
MD5
e3c633e3a73e66f06a4191e7412c3bf0
-
SHA1
32f994aef5edacda4cc4a54b86e0787415e53461
-
SHA256
c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1
-
SHA512
4800b7fcc0bf6fbe2546ee3c58899112b79909e52efb480ab93377093f1422a401c6c8e86fb68b15c8ff28c3b2188e4cf229e4b5887a1a4a2b5d17cba992e476
-
SSDEEP
1536:7nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:7Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2664 omsecor.exe 2676 omsecor.exe 2844 omsecor.exe 1132 omsecor.exe 1912 omsecor.exe 2948 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2744 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 2744 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 2664 omsecor.exe 2676 omsecor.exe 2676 omsecor.exe 1132 omsecor.exe 1132 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2668 set thread context of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2664 set thread context of 2676 2664 omsecor.exe 32 PID 2844 set thread context of 1132 2844 omsecor.exe 36 PID 1912 set thread context of 2948 1912 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2668 wrote to memory of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2668 wrote to memory of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2668 wrote to memory of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2668 wrote to memory of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2668 wrote to memory of 2744 2668 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 30 PID 2744 wrote to memory of 2664 2744 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 31 PID 2744 wrote to memory of 2664 2744 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 31 PID 2744 wrote to memory of 2664 2744 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 31 PID 2744 wrote to memory of 2664 2744 c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe 31 PID 2664 wrote to memory of 2676 2664 omsecor.exe 32 PID 2664 wrote to memory of 2676 2664 omsecor.exe 32 PID 2664 wrote to memory of 2676 2664 omsecor.exe 32 PID 2664 wrote to memory of 2676 2664 omsecor.exe 32 PID 2664 wrote to memory of 2676 2664 omsecor.exe 32 PID 2664 wrote to memory of 2676 2664 omsecor.exe 32 PID 2676 wrote to memory of 2844 2676 omsecor.exe 35 PID 2676 wrote to memory of 2844 2676 omsecor.exe 35 PID 2676 wrote to memory of 2844 2676 omsecor.exe 35 PID 2676 wrote to memory of 2844 2676 omsecor.exe 35 PID 2844 wrote to memory of 1132 2844 omsecor.exe 36 PID 2844 wrote to memory of 1132 2844 omsecor.exe 36 PID 2844 wrote to memory of 1132 2844 omsecor.exe 36 PID 2844 wrote to memory of 1132 2844 omsecor.exe 36 PID 2844 wrote to memory of 1132 2844 omsecor.exe 36 PID 2844 wrote to memory of 1132 2844 omsecor.exe 36 PID 1132 wrote to memory of 1912 1132 omsecor.exe 37 PID 1132 wrote to memory of 1912 1132 omsecor.exe 37 PID 1132 wrote to memory of 1912 1132 omsecor.exe 37 PID 1132 wrote to memory of 1912 1132 omsecor.exe 37 PID 1912 wrote to memory of 2948 1912 omsecor.exe 38 PID 1912 wrote to memory of 2948 1912 omsecor.exe 38 PID 1912 wrote to memory of 2948 1912 omsecor.exe 38 PID 1912 wrote to memory of 2948 1912 omsecor.exe 38 PID 1912 wrote to memory of 2948 1912 omsecor.exe 38 PID 1912 wrote to memory of 2948 1912 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe"C:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exeC:\Users\Admin\AppData\Local\Temp\c3b44afca040e0f46e23246d0bcc9bb809dd9801efdf4fe959e0b0d6859d65c1N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52f302f500edee250920957482838a1dc
SHA1e43fef95c39d303ade69a53c01918ff043a08987
SHA25654b5ff8763932bc56faa588957a2adec0280f75849219943a0f38cac61ece5be
SHA512a469f4668e752a054f863bf632a07ec7daf1ef62524b0eaf53409fd220d09b5d328bf7e40ed9d79cde49067ce2415574c1d71080e0f95cafac30fca1c2459f8f
-
Filesize
96KB
MD5042e2e9efc80c0b5056824ed78228da1
SHA14939a4a19fa945ec3a20dbdbc10d060dad4a8198
SHA2566a1f4d82ddfa964d3c680a293c44614f22f1ad2ddb5843053202b9734b9e6fb3
SHA512365643bac5b70f741432684d77897b58022e3b1d2c917045d350a58d9b0d8a160ae4fcdb2524a1ee15292542e5b0a440f1b6d9b8e187561f6db66e81c702198e
-
Filesize
96KB
MD522f88c28e2b7d65d6f0afbebd69f5d2c
SHA11b2ade7b5f75ab95fdcb59cf42a30a26ce880596
SHA256872447e2ae5e0663edbe7dbce8e9d9010b9879de858ca3695f1ab74383067dcf
SHA5124ea0751a81fc9fe7b6de848ae21d87091a9a0eceb13c6bad40119df6eab50182a6416a09f583b501596a036daf7d22da328335b75aaf820038ce23e64534f717