Analysis
-
max time kernel
114s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 15:37
Static task
static1
Behavioral task
behavioral1
Sample
30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe
Resource
win7-20240903-en
General
-
Target
30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe
-
Size
134KB
-
MD5
af5922b2a0fe5629a03231e9b22004d0
-
SHA1
3f2787307b8485d8dc43ad0a1a7bff05a01eec2a
-
SHA256
30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6
-
SHA512
19c258c9b424fcf84a53065d906f093e2b69607c3d0cecfca0f2814f12b91318bf71848d04b7081f8f7c2492d0d9d62358fae44ea285ec6ca368de8fe51296c6
-
SSDEEP
1536:aDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCia:8iRTeH0iqAW6J6f1tqF6dngNmaZCia
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2272 omsecor.exe 2956 omsecor.exe 664 omsecor.exe 2300 omsecor.exe 1888 omsecor.exe 2812 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2136 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 2136 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 2272 omsecor.exe 2956 omsecor.exe 2956 omsecor.exe 2300 omsecor.exe 2300 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2120 set thread context of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2272 set thread context of 2956 2272 omsecor.exe 32 PID 664 set thread context of 2300 664 omsecor.exe 36 PID 1888 set thread context of 2812 1888 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2120 wrote to memory of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2120 wrote to memory of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2120 wrote to memory of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2120 wrote to memory of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2120 wrote to memory of 2136 2120 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 30 PID 2136 wrote to memory of 2272 2136 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 31 PID 2136 wrote to memory of 2272 2136 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 31 PID 2136 wrote to memory of 2272 2136 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 31 PID 2136 wrote to memory of 2272 2136 30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe 31 PID 2272 wrote to memory of 2956 2272 omsecor.exe 32 PID 2272 wrote to memory of 2956 2272 omsecor.exe 32 PID 2272 wrote to memory of 2956 2272 omsecor.exe 32 PID 2272 wrote to memory of 2956 2272 omsecor.exe 32 PID 2272 wrote to memory of 2956 2272 omsecor.exe 32 PID 2272 wrote to memory of 2956 2272 omsecor.exe 32 PID 2956 wrote to memory of 664 2956 omsecor.exe 35 PID 2956 wrote to memory of 664 2956 omsecor.exe 35 PID 2956 wrote to memory of 664 2956 omsecor.exe 35 PID 2956 wrote to memory of 664 2956 omsecor.exe 35 PID 664 wrote to memory of 2300 664 omsecor.exe 36 PID 664 wrote to memory of 2300 664 omsecor.exe 36 PID 664 wrote to memory of 2300 664 omsecor.exe 36 PID 664 wrote to memory of 2300 664 omsecor.exe 36 PID 664 wrote to memory of 2300 664 omsecor.exe 36 PID 664 wrote to memory of 2300 664 omsecor.exe 36 PID 2300 wrote to memory of 1888 2300 omsecor.exe 37 PID 2300 wrote to memory of 1888 2300 omsecor.exe 37 PID 2300 wrote to memory of 1888 2300 omsecor.exe 37 PID 2300 wrote to memory of 1888 2300 omsecor.exe 37 PID 1888 wrote to memory of 2812 1888 omsecor.exe 38 PID 1888 wrote to memory of 2812 1888 omsecor.exe 38 PID 1888 wrote to memory of 2812 1888 omsecor.exe 38 PID 1888 wrote to memory of 2812 1888 omsecor.exe 38 PID 1888 wrote to memory of 2812 1888 omsecor.exe 38 PID 1888 wrote to memory of 2812 1888 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe"C:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exeC:\Users\Admin\AppData\Local\Temp\30ffcee02f052119d3c030a12ac8133bca285e90e1fcaec61473cbf07e859ac6N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5ba2ff0930883fc87340186a8542dd557
SHA16cc40130ba9d2c1fee1291a33b4a199fc2bd4dde
SHA2569c065d8f244bf88b7e2afd3ef26fed67aa70a1bf4613a047cc33823d90540b92
SHA51261ae807940339fef9340e40135ff1deb4646e517463d5576fb8967c4e88da3116484612dfe1ea27ad9fc207538ab47e52d1eccbbee6852e5c1d8fdcfbf9bf260
-
Filesize
134KB
MD514b8936238a5d203c95eaaf95355f1a7
SHA1abb1396d99bf12ba10f720822eceff904d1ba6a4
SHA256893306342d622c5ebf418eafe26787cd671d0e4f8681d73b21d5b0275fb9ace7
SHA512a403cc68c98bff30b205641d4c597715a3dc787b41b6cc2b63bea8f38227e4dbabe7fec44414d6f447dec6748781e26d6cac25648a3e2f8c4205cf236ef72f38
-
Filesize
134KB
MD533e499a02c8507e6a0c1b24fd4c36452
SHA1d4c9248879be601d6021b1b9b01592a93b3310d8
SHA256f2c1a3770c7b20a67c94a01c68cbbb0a46939378334ae055d60784b023e9b0fb
SHA512bf09f8632890700687cd4c998fe7f6564908031667ea979e1fb67fa88f28a1c55c38c8120e7c13ae6162c12049572c36b219f851f282bf6892fa6d88106c0128