Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 01:50
Static task
static1
Behavioral task
behavioral1
Sample
9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe
Resource
win7-20240903-en
General
-
Target
9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe
-
Size
96KB
-
MD5
5b735a1cd8ff71670149304eafd61905
-
SHA1
0287bd29bc755dd8c58a78e7945a9eea84818c4a
-
SHA256
9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d
-
SHA512
58b964d6b3769034ff48e773bdcec857082733503aea2b301e2f794253f0b1b8be1d0e824dab825d0c5400aadfec61c8a17943d7644ea3bffaccaef55c3d2404
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:MGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1788 omsecor.exe 2720 omsecor.exe 2320 omsecor.exe 844 omsecor.exe 2104 omsecor.exe 1480 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2524 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 2524 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 1788 omsecor.exe 2720 omsecor.exe 2720 omsecor.exe 844 omsecor.exe 844 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1644 set thread context of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 1788 set thread context of 2720 1788 omsecor.exe 32 PID 2320 set thread context of 844 2320 omsecor.exe 36 PID 2104 set thread context of 1480 2104 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 1644 wrote to memory of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 1644 wrote to memory of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 1644 wrote to memory of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 1644 wrote to memory of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 1644 wrote to memory of 2524 1644 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 30 PID 2524 wrote to memory of 1788 2524 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2524 wrote to memory of 1788 2524 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2524 wrote to memory of 1788 2524 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2524 wrote to memory of 1788 2524 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 1788 wrote to memory of 2720 1788 omsecor.exe 32 PID 1788 wrote to memory of 2720 1788 omsecor.exe 32 PID 1788 wrote to memory of 2720 1788 omsecor.exe 32 PID 1788 wrote to memory of 2720 1788 omsecor.exe 32 PID 1788 wrote to memory of 2720 1788 omsecor.exe 32 PID 1788 wrote to memory of 2720 1788 omsecor.exe 32 PID 2720 wrote to memory of 2320 2720 omsecor.exe 35 PID 2720 wrote to memory of 2320 2720 omsecor.exe 35 PID 2720 wrote to memory of 2320 2720 omsecor.exe 35 PID 2720 wrote to memory of 2320 2720 omsecor.exe 35 PID 2320 wrote to memory of 844 2320 omsecor.exe 36 PID 2320 wrote to memory of 844 2320 omsecor.exe 36 PID 2320 wrote to memory of 844 2320 omsecor.exe 36 PID 2320 wrote to memory of 844 2320 omsecor.exe 36 PID 2320 wrote to memory of 844 2320 omsecor.exe 36 PID 2320 wrote to memory of 844 2320 omsecor.exe 36 PID 844 wrote to memory of 2104 844 omsecor.exe 37 PID 844 wrote to memory of 2104 844 omsecor.exe 37 PID 844 wrote to memory of 2104 844 omsecor.exe 37 PID 844 wrote to memory of 2104 844 omsecor.exe 37 PID 2104 wrote to memory of 1480 2104 omsecor.exe 38 PID 2104 wrote to memory of 1480 2104 omsecor.exe 38 PID 2104 wrote to memory of 1480 2104 omsecor.exe 38 PID 2104 wrote to memory of 1480 2104 omsecor.exe 38 PID 2104 wrote to memory of 1480 2104 omsecor.exe 38 PID 2104 wrote to memory of 1480 2104 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe"C:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exeC:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1480
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5852cccb4b4cf2f5956bdeeac6d6b9b72
SHA1abd35fe80200f1ea571956137e57d49df706720e
SHA2561a90b709c575365867d0f6d578c2ea467dba59f5a2df7a4b05025dbef217c2ce
SHA512d979dbe3b0cfb362bb059fb9d3251903f517d8a00e1c92e6af2ee030d315366b0de5c0061efaa9635768ac7410d08a152e9f5a69f5eca5e64cc4646c36769a57
-
Filesize
96KB
MD5ef19bdae8d2bd4c2d1b335a0f392e636
SHA1f993b6d3009c033bfe54b75b857218086f33d478
SHA25659c59dba3f096dce29e054e68fe9e036d806a2715453fed1b8ffef99669e5482
SHA51279bf4a78cce0cb891c6a3d7f005c66e830f1742c10d0b226033b5eeb357e5ffdbbc8ead063fd8265c21a0ca9fa0a1385c4ed921956b2454728b74a3e0dbbf8c0
-
Filesize
96KB
MD57d37980277cc5ff1afe8e2abfef1abc5
SHA1bb413deaa8a98c3265704be526461f347cdbfd7d
SHA2568fb517bcf8ce1c86ce67ae3bf837e3258dbae9f4b53fec0d5ee64907889e8783
SHA512dbbc42309fea939032c36b07128acc1adae2233dcadb821ca3f7193f0077c38b191d47a0262c4a04043789c7301adc8047cdd9c67b071e0922174255e9153985