Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 04:42
Static task
static1
Behavioral task
behavioral1
Sample
bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe
Resource
win7-20240903-en
General
-
Target
bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe
-
Size
96KB
-
MD5
786f4f06717e6df31c71a641de88f62d
-
SHA1
317c99ccac218aa62c89f9f5a48eeafee32f7d6c
-
SHA256
bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033
-
SHA512
371b9eed488019d8b27c6769036055463f2990c49d9db23528fbc2fd74ca09dd1968a1147ee8faa1fc28078817dcde9db92abf705fd73ea11baa497d862e52b1
-
SSDEEP
1536:nnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxz:nGs8cd8eXlYairZYqMddH13z
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2328 omsecor.exe 2856 omsecor.exe 1552 omsecor.exe 2168 omsecor.exe 2064 omsecor.exe 2208 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1264 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 1264 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 2328 omsecor.exe 2856 omsecor.exe 2856 omsecor.exe 2168 omsecor.exe 2168 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2456 set thread context of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 2328 set thread context of 2856 2328 omsecor.exe 33 PID 1552 set thread context of 2168 1552 omsecor.exe 37 PID 2064 set thread context of 2208 2064 omsecor.exe 39 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2456 wrote to memory of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 2456 wrote to memory of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 2456 wrote to memory of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 2456 wrote to memory of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 2456 wrote to memory of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 2456 wrote to memory of 1264 2456 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 31 PID 1264 wrote to memory of 2328 1264 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 32 PID 1264 wrote to memory of 2328 1264 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 32 PID 1264 wrote to memory of 2328 1264 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 32 PID 1264 wrote to memory of 2328 1264 bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe 32 PID 2328 wrote to memory of 2856 2328 omsecor.exe 33 PID 2328 wrote to memory of 2856 2328 omsecor.exe 33 PID 2328 wrote to memory of 2856 2328 omsecor.exe 33 PID 2328 wrote to memory of 2856 2328 omsecor.exe 33 PID 2328 wrote to memory of 2856 2328 omsecor.exe 33 PID 2328 wrote to memory of 2856 2328 omsecor.exe 33 PID 2856 wrote to memory of 1552 2856 omsecor.exe 36 PID 2856 wrote to memory of 1552 2856 omsecor.exe 36 PID 2856 wrote to memory of 1552 2856 omsecor.exe 36 PID 2856 wrote to memory of 1552 2856 omsecor.exe 36 PID 1552 wrote to memory of 2168 1552 omsecor.exe 37 PID 1552 wrote to memory of 2168 1552 omsecor.exe 37 PID 1552 wrote to memory of 2168 1552 omsecor.exe 37 PID 1552 wrote to memory of 2168 1552 omsecor.exe 37 PID 1552 wrote to memory of 2168 1552 omsecor.exe 37 PID 1552 wrote to memory of 2168 1552 omsecor.exe 37 PID 2168 wrote to memory of 2064 2168 omsecor.exe 38 PID 2168 wrote to memory of 2064 2168 omsecor.exe 38 PID 2168 wrote to memory of 2064 2168 omsecor.exe 38 PID 2168 wrote to memory of 2064 2168 omsecor.exe 38 PID 2064 wrote to memory of 2208 2064 omsecor.exe 39 PID 2064 wrote to memory of 2208 2064 omsecor.exe 39 PID 2064 wrote to memory of 2208 2064 omsecor.exe 39 PID 2064 wrote to memory of 2208 2064 omsecor.exe 39 PID 2064 wrote to memory of 2208 2064 omsecor.exe 39 PID 2064 wrote to memory of 2208 2064 omsecor.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe"C:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exeC:\Users\Admin\AppData\Local\Temp\bbced7c800c29a8a471f716ec5a88661897beb816622eeb3489fcdf652ddd033.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5b4f488426361b370a90ce94df315ce49
SHA16f0b2505c0c5fa09c08ed9b2db445f1620a83c26
SHA256bf7a20aed9ed88c4ffaf0d235217b98dc5abb4e12ebd2e0c2fc8cfa9baa3b908
SHA51212375a544d6149ae0d8047d0cba8082d642450a80738a9c6883a07cfd42562e999f0ca2eb10697952099c745300350ebca725271979591dcb992e9d3a98571f3
-
Filesize
96KB
MD54d023c72f6ea26635e129da12df89d14
SHA188d79343109bd02e81ac0749a8a42f90e0d526a0
SHA2563aa773ab2ce812e573462b14ee31a55353e2a9f23ebf7470730f30a0d1263b58
SHA512cc7b4dd8fdc60ec34f42bca2f033d28dcfe01e72318c1952cfbb59555109ae9d86675f392aa60bb85e6b30d04aab87dc260dda5a80a32e307f6859cba7123e77
-
Filesize
96KB
MD5ea5d3a485290db36dd2f0074eb0c6559
SHA141b34feeec79368e7d46459c04535a334b874220
SHA25668f2d61d0e7398128c52ef37e94e93f9fa2a4beb07e7503b7d678b18077c71b6
SHA512a005800a239e1aedcfbc7bb84ddf5063ed1beabbf80bbd7194a05e1420b1ffda5ff3de37bfabb873f47e730f94293a54850cb550bcb5d156e209145880ed63d0