Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe
Resource
win7-20240903-en
General
-
Target
f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe
-
Size
96KB
-
MD5
3adba6ae7f2b460b4f81ee19b36401bb
-
SHA1
569c94a9087353c21d68f15d4ee2e6b8ac62bc75
-
SHA256
f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd
-
SHA512
a6d7694705f84b2824cf66ef8a1b5f780d7dec5d970409be78fcf4d89796330001b3f6831f22c61c7daff800b8a9fc66748bfca163e18b6cce654d3941f1d115
-
SSDEEP
1536:7nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:7Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2456 omsecor.exe 2376 omsecor.exe 1072 omsecor.exe 1568 omsecor.exe 1756 omsecor.exe 2188 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2300 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 2300 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 2456 omsecor.exe 2376 omsecor.exe 2376 omsecor.exe 1568 omsecor.exe 1568 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2280 set thread context of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2456 set thread context of 2376 2456 omsecor.exe 33 PID 1072 set thread context of 1568 1072 omsecor.exe 36 PID 1756 set thread context of 2188 1756 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2280 wrote to memory of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2280 wrote to memory of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2280 wrote to memory of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2280 wrote to memory of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2280 wrote to memory of 2300 2280 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 31 PID 2300 wrote to memory of 2456 2300 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 32 PID 2300 wrote to memory of 2456 2300 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 32 PID 2300 wrote to memory of 2456 2300 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 32 PID 2300 wrote to memory of 2456 2300 f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe 32 PID 2456 wrote to memory of 2376 2456 omsecor.exe 33 PID 2456 wrote to memory of 2376 2456 omsecor.exe 33 PID 2456 wrote to memory of 2376 2456 omsecor.exe 33 PID 2456 wrote to memory of 2376 2456 omsecor.exe 33 PID 2456 wrote to memory of 2376 2456 omsecor.exe 33 PID 2456 wrote to memory of 2376 2456 omsecor.exe 33 PID 2376 wrote to memory of 1072 2376 omsecor.exe 35 PID 2376 wrote to memory of 1072 2376 omsecor.exe 35 PID 2376 wrote to memory of 1072 2376 omsecor.exe 35 PID 2376 wrote to memory of 1072 2376 omsecor.exe 35 PID 1072 wrote to memory of 1568 1072 omsecor.exe 36 PID 1072 wrote to memory of 1568 1072 omsecor.exe 36 PID 1072 wrote to memory of 1568 1072 omsecor.exe 36 PID 1072 wrote to memory of 1568 1072 omsecor.exe 36 PID 1072 wrote to memory of 1568 1072 omsecor.exe 36 PID 1072 wrote to memory of 1568 1072 omsecor.exe 36 PID 1568 wrote to memory of 1756 1568 omsecor.exe 37 PID 1568 wrote to memory of 1756 1568 omsecor.exe 37 PID 1568 wrote to memory of 1756 1568 omsecor.exe 37 PID 1568 wrote to memory of 1756 1568 omsecor.exe 37 PID 1756 wrote to memory of 2188 1756 omsecor.exe 38 PID 1756 wrote to memory of 2188 1756 omsecor.exe 38 PID 1756 wrote to memory of 2188 1756 omsecor.exe 38 PID 1756 wrote to memory of 2188 1756 omsecor.exe 38 PID 1756 wrote to memory of 2188 1756 omsecor.exe 38 PID 1756 wrote to memory of 2188 1756 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe"C:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exeC:\Users\Admin\AppData\Local\Temp\f4eb2a1db4fd9e9fdaa1095af21f22d9f14ec4ad1a5c0095c9af48651e3da8bd.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD558feb5f50dc2105b23aa4a2782f3cefe
SHA15bee646c5bc19c249ea4d412a85ea80e5351674b
SHA256eb588dd9111342ff71a40b79e92098d703062f033987ad4861ee65b66946d194
SHA5129f5a18b2d2aa53de207f14e192dbcc45db2851cf5f4b518bc7523617e47bed52407d21c9926d4b45e6a27657479d1037fefcbfaf39d881fc2e5b7830f66ad0ee
-
Filesize
96KB
MD59a287844a035d0f6f6b96b6c6a257745
SHA14052b71f8b724985a475c93f96e7457e083cfc68
SHA256a06846af55fa0fa96b692759bdfdd34d7bc19f3bbcd31fd1c0db3472d1b8e9ff
SHA512f8bd5d1d7cb7fa60d43f51c25e611fea49e2a6b58772c90d3d890253ae5d29c0dffe3cbb3b53ea93341ff1853223039820daa61f1686ad76838633f1c75896b5
-
Filesize
96KB
MD513bdde0622fd7d6ac9c4c81c5f107152
SHA14cfad94c24075657b810e18afec10db017e5ea09
SHA256b143996d010920ba2fc7c2f24ad1285185c8fecc0ee470b90805d5092fa2fe28
SHA512183cd55936221f8959b89d8c662b87ea1e6ea58f34d0eea8d0865cf3f167b7056294c0b9e25aacb01676472d38007b6f8a0e982402faddef7a3a94c208abad09