Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 19:37
Static task
static1
Behavioral task
behavioral1
Sample
9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe
Resource
win7-20241010-en
General
-
Target
9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe
-
Size
96KB
-
MD5
6fba36ee6a4b30872aceb83cb2a4c130
-
SHA1
24bb0d6e6156e752859729f8961807e75bca7028
-
SHA256
9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9
-
SHA512
5a1b0e4e33093138ac222986da291e4a2cf1c29d28b5cd96ccd8fdff3f4011320fcd6015e5200e6823d4999fb34c634f8a15ac1dbb2644356c985dc58e496d77
-
SSDEEP
1536:gnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:gGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2652 omsecor.exe 2928 omsecor.exe 2684 omsecor.exe 2104 omsecor.exe 1596 omsecor.exe 1748 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2296 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 2296 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 2652 omsecor.exe 2928 omsecor.exe 2928 omsecor.exe 2104 omsecor.exe 2104 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2736 set thread context of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2652 set thread context of 2928 2652 omsecor.exe 32 PID 2684 set thread context of 2104 2684 omsecor.exe 35 PID 1596 set thread context of 1748 1596 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2736 wrote to memory of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2736 wrote to memory of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2736 wrote to memory of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2736 wrote to memory of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2736 wrote to memory of 2296 2736 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 30 PID 2296 wrote to memory of 2652 2296 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 31 PID 2296 wrote to memory of 2652 2296 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 31 PID 2296 wrote to memory of 2652 2296 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 31 PID 2296 wrote to memory of 2652 2296 9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe 31 PID 2652 wrote to memory of 2928 2652 omsecor.exe 32 PID 2652 wrote to memory of 2928 2652 omsecor.exe 32 PID 2652 wrote to memory of 2928 2652 omsecor.exe 32 PID 2652 wrote to memory of 2928 2652 omsecor.exe 32 PID 2652 wrote to memory of 2928 2652 omsecor.exe 32 PID 2652 wrote to memory of 2928 2652 omsecor.exe 32 PID 2928 wrote to memory of 2684 2928 omsecor.exe 34 PID 2928 wrote to memory of 2684 2928 omsecor.exe 34 PID 2928 wrote to memory of 2684 2928 omsecor.exe 34 PID 2928 wrote to memory of 2684 2928 omsecor.exe 34 PID 2684 wrote to memory of 2104 2684 omsecor.exe 35 PID 2684 wrote to memory of 2104 2684 omsecor.exe 35 PID 2684 wrote to memory of 2104 2684 omsecor.exe 35 PID 2684 wrote to memory of 2104 2684 omsecor.exe 35 PID 2684 wrote to memory of 2104 2684 omsecor.exe 35 PID 2684 wrote to memory of 2104 2684 omsecor.exe 35 PID 2104 wrote to memory of 1596 2104 omsecor.exe 36 PID 2104 wrote to memory of 1596 2104 omsecor.exe 36 PID 2104 wrote to memory of 1596 2104 omsecor.exe 36 PID 2104 wrote to memory of 1596 2104 omsecor.exe 36 PID 1596 wrote to memory of 1748 1596 omsecor.exe 37 PID 1596 wrote to memory of 1748 1596 omsecor.exe 37 PID 1596 wrote to memory of 1748 1596 omsecor.exe 37 PID 1596 wrote to memory of 1748 1596 omsecor.exe 37 PID 1596 wrote to memory of 1748 1596 omsecor.exe 37 PID 1596 wrote to memory of 1748 1596 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe"C:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exeC:\Users\Admin\AppData\Local\Temp\9815e4ab48af6d8588dce35a054f43b299cf774137923f71248602cf8ce617b9N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52fda53bae1a990bd562c2b0fa6abf020
SHA1010478f5e1b2360977c63ac3b5b8718f0542c6a8
SHA256156761a4da091b2c24b114d7a918a1509a2f18adbf3ab77e391066b3c2a75d1e
SHA51294a50e6ea461a2c7fedce66e56a11f9ab9a518a4a9675cc065b554637b05a970c87742582bdff8e1d84c3b92f5eb241f31ff6da9963ef65c946e9eb697b2ece9
-
Filesize
96KB
MD5719c49f71661f5bee1ab4d87289a29dc
SHA1327e1904bcd3debe845f961f2048a49231bdcf4e
SHA256516b015988dc5bd7f96a71d6aa9860d19fb646c03bce53e79a9757e356b927e9
SHA5123ae033fe39066cb2fca623519c08871f6f4ec39404369406f5f1a31e073f22231ca80b6f82a355bc38e1b2b4172d7e1b03a0825cf1c6cb8784bce8cf7f78c545
-
Filesize
96KB
MD5f449e94dea3d9693155b202692fcc98e
SHA17ccc75caa16c294e7d8ab270d4cd53049600ef97
SHA2564d8cb44cd5ebf3ba737aa7ec31e894cc7363f41f6a39ac89ced894cb47a16a77
SHA5124441248b6f7a219214ebead6b898ba2570584b552b28b16ed9f79a9720249e4cfbb2ad1cd70f0a22afbb9ebe1f6a1b92c0dc9baa379f263760bf34cc0c3e2c23