Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 18:36
Static task
static1
Behavioral task
behavioral1
Sample
7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe
Resource
win7-20240903-en
General
-
Target
7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe
-
Size
96KB
-
MD5
25010824fed38e2ca5cba1fad94fb28c
-
SHA1
4c571f8c16026f1223812598ce38654a9f7d5bf6
-
SHA256
7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0
-
SHA512
c6e4c68647d39c09920c29769f96182634e21c53f92e5e1e05004c8220c04a5a17a8f03fc1dc1bf2ea116c5bb5ad73d299014740ac8936565869c8f81df805ea
-
SSDEEP
1536:1nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxB:1Gs8cd8eXlYairZYqMddH13B
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2364 omsecor.exe 1032 omsecor.exe 1440 omsecor.exe 1872 omsecor.exe 1044 omsecor.exe 1920 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2400 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 2400 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 2364 omsecor.exe 1032 omsecor.exe 1032 omsecor.exe 1872 omsecor.exe 1872 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2108 set thread context of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2364 set thread context of 1032 2364 omsecor.exe 32 PID 1440 set thread context of 1872 1440 omsecor.exe 36 PID 1044 set thread context of 1920 1044 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2108 wrote to memory of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2108 wrote to memory of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2108 wrote to memory of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2108 wrote to memory of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2108 wrote to memory of 2400 2108 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 30 PID 2400 wrote to memory of 2364 2400 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 31 PID 2400 wrote to memory of 2364 2400 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 31 PID 2400 wrote to memory of 2364 2400 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 31 PID 2400 wrote to memory of 2364 2400 7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe 31 PID 2364 wrote to memory of 1032 2364 omsecor.exe 32 PID 2364 wrote to memory of 1032 2364 omsecor.exe 32 PID 2364 wrote to memory of 1032 2364 omsecor.exe 32 PID 2364 wrote to memory of 1032 2364 omsecor.exe 32 PID 2364 wrote to memory of 1032 2364 omsecor.exe 32 PID 2364 wrote to memory of 1032 2364 omsecor.exe 32 PID 1032 wrote to memory of 1440 1032 omsecor.exe 35 PID 1032 wrote to memory of 1440 1032 omsecor.exe 35 PID 1032 wrote to memory of 1440 1032 omsecor.exe 35 PID 1032 wrote to memory of 1440 1032 omsecor.exe 35 PID 1440 wrote to memory of 1872 1440 omsecor.exe 36 PID 1440 wrote to memory of 1872 1440 omsecor.exe 36 PID 1440 wrote to memory of 1872 1440 omsecor.exe 36 PID 1440 wrote to memory of 1872 1440 omsecor.exe 36 PID 1440 wrote to memory of 1872 1440 omsecor.exe 36 PID 1440 wrote to memory of 1872 1440 omsecor.exe 36 PID 1872 wrote to memory of 1044 1872 omsecor.exe 37 PID 1872 wrote to memory of 1044 1872 omsecor.exe 37 PID 1872 wrote to memory of 1044 1872 omsecor.exe 37 PID 1872 wrote to memory of 1044 1872 omsecor.exe 37 PID 1044 wrote to memory of 1920 1044 omsecor.exe 38 PID 1044 wrote to memory of 1920 1044 omsecor.exe 38 PID 1044 wrote to memory of 1920 1044 omsecor.exe 38 PID 1044 wrote to memory of 1920 1044 omsecor.exe 38 PID 1044 wrote to memory of 1920 1044 omsecor.exe 38 PID 1044 wrote to memory of 1920 1044 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe"C:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exeC:\Users\Admin\AppData\Local\Temp\7c49c8d862332ed00640dfa7ea7c4b22c46455f64b6b6c09bd8425b3f2f531a0.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b40f2d66eecd5c396c94bc245d0c13fe
SHA1b2dca0ec48fe62dc3819cc063ddb04fc80925e24
SHA2564fadda8f37a7732dd377cb48a99b681fbbc6fde23ec8c55ccfd3ed0669edb27b
SHA512568a86b4efaca2698fed072c8530a70d7b4a88c25efafefbf046ff0ea08439530b7b141b2ef3d93e397ec77b31303959ccae5b3622e89b5013d2d150ef7eb279
-
Filesize
96KB
MD5f6d8d62d97d32c28a994a83a61d3326e
SHA19b623ba447d7154204a8a61e778a344b4688a693
SHA2563be6872a5950797e8d172d9efefbea6373ae60feae88ddabf2374e478efb269a
SHA51205c9a2e1418906033a464c6992ad118fd1506d759734374de6098b356a661dc87465cd332019729e843a18319ac7b956804f25371bf64a2919c256ea5e1a6c00
-
Filesize
96KB
MD544ffbd9164c6a70fd305404013a0f037
SHA1aeffbd851262a0eccd7a980cde8c298e2ac51a48
SHA256903bbc81c61d7cf09815d86477885cfeb451be7da67b7d1cb43b58a9e2c5a4ac
SHA512a0f1e278ebfe35d44bb1165dd06fafc519d1925cd53520b48bade5356663d73b4f982df39a20c07670d15c9ee8dfb24f979f4b477cdab9d31dd8278a11eb0ed7