Analysis
-
max time kernel
116s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe
Resource
win7-20241010-en
General
-
Target
07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe
-
Size
134KB
-
MD5
a651b6e2fbb0d58ae9472a2aa7110560
-
SHA1
69b4d97e581a4024a6e6dc1533c7de9c506ba717
-
SHA256
07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011
-
SHA512
80d1a79593cd8e103e6375fd8dc33361e92adce6514bb426d6157f0841a03a82b0dbccb9fffd7eaa818ddc73b64a9540ee0e8edb94315ac49aaeebcc5ee76bb3
-
SSDEEP
1536:ZDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:JiRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1224 omsecor.exe 2040 omsecor.exe 1352 omsecor.exe 1148 omsecor.exe 764 omsecor.exe 3008 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2364 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 2364 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 1224 omsecor.exe 2040 omsecor.exe 2040 omsecor.exe 1148 omsecor.exe 1148 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1628 set thread context of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 1224 set thread context of 2040 1224 omsecor.exe 32 PID 1352 set thread context of 1148 1352 omsecor.exe 36 PID 764 set thread context of 3008 764 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 1628 wrote to memory of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 1628 wrote to memory of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 1628 wrote to memory of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 1628 wrote to memory of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 1628 wrote to memory of 2364 1628 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 30 PID 2364 wrote to memory of 1224 2364 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 31 PID 2364 wrote to memory of 1224 2364 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 31 PID 2364 wrote to memory of 1224 2364 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 31 PID 2364 wrote to memory of 1224 2364 07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe 31 PID 1224 wrote to memory of 2040 1224 omsecor.exe 32 PID 1224 wrote to memory of 2040 1224 omsecor.exe 32 PID 1224 wrote to memory of 2040 1224 omsecor.exe 32 PID 1224 wrote to memory of 2040 1224 omsecor.exe 32 PID 1224 wrote to memory of 2040 1224 omsecor.exe 32 PID 1224 wrote to memory of 2040 1224 omsecor.exe 32 PID 2040 wrote to memory of 1352 2040 omsecor.exe 35 PID 2040 wrote to memory of 1352 2040 omsecor.exe 35 PID 2040 wrote to memory of 1352 2040 omsecor.exe 35 PID 2040 wrote to memory of 1352 2040 omsecor.exe 35 PID 1352 wrote to memory of 1148 1352 omsecor.exe 36 PID 1352 wrote to memory of 1148 1352 omsecor.exe 36 PID 1352 wrote to memory of 1148 1352 omsecor.exe 36 PID 1352 wrote to memory of 1148 1352 omsecor.exe 36 PID 1352 wrote to memory of 1148 1352 omsecor.exe 36 PID 1352 wrote to memory of 1148 1352 omsecor.exe 36 PID 1148 wrote to memory of 764 1148 omsecor.exe 37 PID 1148 wrote to memory of 764 1148 omsecor.exe 37 PID 1148 wrote to memory of 764 1148 omsecor.exe 37 PID 1148 wrote to memory of 764 1148 omsecor.exe 37 PID 764 wrote to memory of 3008 764 omsecor.exe 38 PID 764 wrote to memory of 3008 764 omsecor.exe 38 PID 764 wrote to memory of 3008 764 omsecor.exe 38 PID 764 wrote to memory of 3008 764 omsecor.exe 38 PID 764 wrote to memory of 3008 764 omsecor.exe 38 PID 764 wrote to memory of 3008 764 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe"C:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exeC:\Users\Admin\AppData\Local\Temp\07aa88fabdc678cbbcbb589aef17153eb40dbaa4248924daa188f8616cd7c011N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD54cfc60cf8d866f8ed9a61c3d8eca5b73
SHA13df4dc2a340318d776357c4885141e79d224008b
SHA2561294949f6109a02328421cca2cb01fa528262fb757caeec6a76939fb351a7e7b
SHA512b0ca5c95f4b35a8eba0b5efc11386064a1175aefca2246caba937c9ccee0ddfde70dedb921a1a504673674d48c10793aeea6436f3d06be3b7a78c2a4b5eaf2e5
-
Filesize
134KB
MD5f5bc1d41601d2f725141739351b0d0c0
SHA13690b209deb09b7a5eb9c7eb7f65bf036f1c3e1a
SHA25663ff5ad0887954487ee9c5756d1b76d5c93e7121f7184f6d6a4162832906541b
SHA512805fd4b10d330df00dcee41a5ec0da06a3b661774429d1fa2788ee001cf24f690ba8c4b78fe00cd774ccef8f3f04659fcdf24d9bea196accb5df7cb5a00f3c2d
-
Filesize
134KB
MD53166a85e0c357bd01851c6175cfc4724
SHA1d06ec22ff6ba1f1d7d87ffb05f69e646b0f97f36
SHA256e7cc7ae7d08d5763264f7c88fa1872f7d6e988767d1e2cdc4be2dd8a10177842
SHA512e01c8c7f91af99154e0cbea762938092b388cad88de4d6ea089c315f88a33969e0d5066b898f74764783df60de019433c698acec0c204b79fdfb79beb8112457