Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 02:00
Static task
static1
Behavioral task
behavioral1
Sample
9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe
Resource
win7-20240903-en
General
-
Target
9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe
-
Size
96KB
-
MD5
5b735a1cd8ff71670149304eafd61905
-
SHA1
0287bd29bc755dd8c58a78e7945a9eea84818c4a
-
SHA256
9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d
-
SHA512
58b964d6b3769034ff48e773bdcec857082733503aea2b301e2f794253f0b1b8be1d0e824dab825d0c5400aadfec61c8a17943d7644ea3bffaccaef55c3d2404
-
SSDEEP
1536:MnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:MGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3032 omsecor.exe 2896 omsecor.exe 2008 omsecor.exe 2384 omsecor.exe 2580 omsecor.exe 1776 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2220 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 2220 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 3032 omsecor.exe 2896 omsecor.exe 2896 omsecor.exe 2384 omsecor.exe 2384 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2376 set thread context of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 3032 set thread context of 2896 3032 omsecor.exe 33 PID 2008 set thread context of 2384 2008 omsecor.exe 36 PID 2580 set thread context of 1776 2580 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2376 wrote to memory of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2376 wrote to memory of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2376 wrote to memory of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2376 wrote to memory of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2376 wrote to memory of 2220 2376 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 31 PID 2220 wrote to memory of 3032 2220 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 32 PID 2220 wrote to memory of 3032 2220 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 32 PID 2220 wrote to memory of 3032 2220 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 32 PID 2220 wrote to memory of 3032 2220 9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe 32 PID 3032 wrote to memory of 2896 3032 omsecor.exe 33 PID 3032 wrote to memory of 2896 3032 omsecor.exe 33 PID 3032 wrote to memory of 2896 3032 omsecor.exe 33 PID 3032 wrote to memory of 2896 3032 omsecor.exe 33 PID 3032 wrote to memory of 2896 3032 omsecor.exe 33 PID 3032 wrote to memory of 2896 3032 omsecor.exe 33 PID 2896 wrote to memory of 2008 2896 omsecor.exe 35 PID 2896 wrote to memory of 2008 2896 omsecor.exe 35 PID 2896 wrote to memory of 2008 2896 omsecor.exe 35 PID 2896 wrote to memory of 2008 2896 omsecor.exe 35 PID 2008 wrote to memory of 2384 2008 omsecor.exe 36 PID 2008 wrote to memory of 2384 2008 omsecor.exe 36 PID 2008 wrote to memory of 2384 2008 omsecor.exe 36 PID 2008 wrote to memory of 2384 2008 omsecor.exe 36 PID 2008 wrote to memory of 2384 2008 omsecor.exe 36 PID 2008 wrote to memory of 2384 2008 omsecor.exe 36 PID 2384 wrote to memory of 2580 2384 omsecor.exe 37 PID 2384 wrote to memory of 2580 2384 omsecor.exe 37 PID 2384 wrote to memory of 2580 2384 omsecor.exe 37 PID 2384 wrote to memory of 2580 2384 omsecor.exe 37 PID 2580 wrote to memory of 1776 2580 omsecor.exe 38 PID 2580 wrote to memory of 1776 2580 omsecor.exe 38 PID 2580 wrote to memory of 1776 2580 omsecor.exe 38 PID 2580 wrote to memory of 1776 2580 omsecor.exe 38 PID 2580 wrote to memory of 1776 2580 omsecor.exe 38 PID 2580 wrote to memory of 1776 2580 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe"C:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exeC:\Users\Admin\AppData\Local\Temp\9c9410731e693848b6957ecb4d14092872c10c11d9b03351f48504ffc932172d.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5852cccb4b4cf2f5956bdeeac6d6b9b72
SHA1abd35fe80200f1ea571956137e57d49df706720e
SHA2561a90b709c575365867d0f6d578c2ea467dba59f5a2df7a4b05025dbef217c2ce
SHA512d979dbe3b0cfb362bb059fb9d3251903f517d8a00e1c92e6af2ee030d315366b0de5c0061efaa9635768ac7410d08a152e9f5a69f5eca5e64cc4646c36769a57
-
Filesize
96KB
MD5c91cbce74e25fa1fa8d0a4c510aaf00f
SHA1f8ef15d9472a7da34d9e2714a1ae6eb556c46857
SHA256789ab9edb016fc42adfcec7e0d562acd169f5915250e0dcba67a6637c4e33d16
SHA5127d899c0f6bc7fed515590179cafe77c910980990b59152fcc8db14a7b4f3d92c2de0a68068fd8a5f9d64c7e75712b330b1c814fcc57beb847164259f975078e0
-
Filesize
96KB
MD593e2a0cadbc9e3ea8ca06dc2662fbb25
SHA187d23de5cc10b4a3c2e7f643a78bcb906ef41687
SHA256309e9baf86575c1d9ceeb4f68e8621236bb36bedb0f87bbf0437f9940e4dc047
SHA5121f534c3ff333a2e0a580726e222526a6257c1ad7107ecb95e4a2b37c1b70ecc201e9694b694a445d18e884d9977e84780c22ff2c452f4c7d10e99d2a04c865fc