Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 06:43
Static task
static1
Behavioral task
behavioral1
Sample
f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe
Resource
win7-20241010-en
General
-
Target
f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe
-
Size
134KB
-
MD5
40f791e02669d58d787e4829aa569385
-
SHA1
6c7ba5f8dba69d428587efc45d567692fc8b2550
-
SHA256
f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d
-
SHA512
4b5f310d676da4179164812771154243de44bef4f4c3f2b4fc7a1ab52f7d7a33e7902114fb0be66641837c6a141e971e0b844d6d5e4f8c2c45d65a2b7214325a
-
SSDEEP
1536:yDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCi9:kiRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1936 omsecor.exe 2492 omsecor.exe 1008 omsecor.exe 660 omsecor.exe 1944 omsecor.exe 2888 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2564 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 2564 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 1936 omsecor.exe 2492 omsecor.exe 2492 omsecor.exe 660 omsecor.exe 660 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2368 set thread context of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 1936 set thread context of 2492 1936 omsecor.exe 32 PID 1008 set thread context of 660 1008 omsecor.exe 36 PID 1944 set thread context of 2888 1944 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 2368 wrote to memory of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 2368 wrote to memory of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 2368 wrote to memory of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 2368 wrote to memory of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 2368 wrote to memory of 2564 2368 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 30 PID 2564 wrote to memory of 1936 2564 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 31 PID 2564 wrote to memory of 1936 2564 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 31 PID 2564 wrote to memory of 1936 2564 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 31 PID 2564 wrote to memory of 1936 2564 f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe 31 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 1936 wrote to memory of 2492 1936 omsecor.exe 32 PID 2492 wrote to memory of 1008 2492 omsecor.exe 35 PID 2492 wrote to memory of 1008 2492 omsecor.exe 35 PID 2492 wrote to memory of 1008 2492 omsecor.exe 35 PID 2492 wrote to memory of 1008 2492 omsecor.exe 35 PID 1008 wrote to memory of 660 1008 omsecor.exe 36 PID 1008 wrote to memory of 660 1008 omsecor.exe 36 PID 1008 wrote to memory of 660 1008 omsecor.exe 36 PID 1008 wrote to memory of 660 1008 omsecor.exe 36 PID 1008 wrote to memory of 660 1008 omsecor.exe 36 PID 1008 wrote to memory of 660 1008 omsecor.exe 36 PID 660 wrote to memory of 1944 660 omsecor.exe 37 PID 660 wrote to memory of 1944 660 omsecor.exe 37 PID 660 wrote to memory of 1944 660 omsecor.exe 37 PID 660 wrote to memory of 1944 660 omsecor.exe 37 PID 1944 wrote to memory of 2888 1944 omsecor.exe 38 PID 1944 wrote to memory of 2888 1944 omsecor.exe 38 PID 1944 wrote to memory of 2888 1944 omsecor.exe 38 PID 1944 wrote to memory of 2888 1944 omsecor.exe 38 PID 1944 wrote to memory of 2888 1944 omsecor.exe 38 PID 1944 wrote to memory of 2888 1944 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe"C:\Users\Admin\AppData\Local\Temp\f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exeC:\Users\Admin\AppData\Local\Temp\f63be088119cae28086e3bfbd2982bbc5e306cf885ff85deaafbef604645104d.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5f1ddf165c47aa84cd0c89ade1304e44e
SHA130c99619fecaf5f47bb15076085372cd531b2b98
SHA25621500030b6005e0331bd2db599f5b28266cbe13fe3fabc5e35d0fceeed8a6ae0
SHA51247c715033ea8c036413af05808069fe377a584ab03bcd9709584c1a57e6992fc86e1e1fda1998684109e447091e2fb7174abb050f8ea6c575014a1823d5291ca
-
Filesize
134KB
MD529c9679535d25cb0daa90ee8ed7a24e0
SHA1b641966f8aeda5975b1f46dcb11a38cb47f81c6c
SHA256dfe53fb9d9be931408c7e79eaeb6b5a8405beac5b328535a77d8a0ede994199e
SHA5127e162756fcb091d8e42b13e3e11b1db54727e44a6234fa780a20be6663751b1a5801c3847c8174aeadb9f15f0fa9cb21314ea36dfefc1ff729aa937b1759e7df
-
Filesize
134KB
MD5b9375b50a04bfd5872b7732277e1d7bf
SHA14d635a25b831b8f8f8909f7eb8687b3db1b0839a
SHA25613c80aba25d733c1d7f8b50e41e5184df67037a76bb58d9521d1867d8f6e0bf2
SHA5122d242b86d067e26a4afb157d09ca9c0931cfb097eca768aa282cd0c3193a8036b8a993ca4ef65aa508c76c929e08304a6178e7598cd4a9eb8085d2c368d4bfbd