Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 10:34
Static task
static1
Behavioral task
behavioral1
Sample
25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe
Resource
win7-20240903-en
General
-
Target
25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe
-
Size
96KB
-
MD5
82a3064afc256638a9bc8609d7b04f20
-
SHA1
dc8fcf3de8dc90c81656256f402e159074a0a9b1
-
SHA256
25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0
-
SHA512
957c1028ed7350bfc7d7108be87bbe5ada1aad159895b29c6c18e12da7478525da5c04dc7d5e917bcab5383be9a7d713cf33a201d47024a6e80bb992e5605677
-
SSDEEP
1536:2nAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:2Gs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2452 omsecor.exe 2180 omsecor.exe 2948 omsecor.exe 2900 omsecor.exe 1252 omsecor.exe 1760 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1196 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 1196 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 2452 omsecor.exe 2180 omsecor.exe 2180 omsecor.exe 2900 omsecor.exe 2900 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2416 set thread context of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 2452 set thread context of 2180 2452 omsecor.exe 32 PID 2948 set thread context of 2900 2948 omsecor.exe 36 PID 1252 set thread context of 1760 1252 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 2416 wrote to memory of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 2416 wrote to memory of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 2416 wrote to memory of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 2416 wrote to memory of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 2416 wrote to memory of 1196 2416 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 30 PID 1196 wrote to memory of 2452 1196 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 31 PID 1196 wrote to memory of 2452 1196 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 31 PID 1196 wrote to memory of 2452 1196 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 31 PID 1196 wrote to memory of 2452 1196 25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe 31 PID 2452 wrote to memory of 2180 2452 omsecor.exe 32 PID 2452 wrote to memory of 2180 2452 omsecor.exe 32 PID 2452 wrote to memory of 2180 2452 omsecor.exe 32 PID 2452 wrote to memory of 2180 2452 omsecor.exe 32 PID 2452 wrote to memory of 2180 2452 omsecor.exe 32 PID 2452 wrote to memory of 2180 2452 omsecor.exe 32 PID 2180 wrote to memory of 2948 2180 omsecor.exe 35 PID 2180 wrote to memory of 2948 2180 omsecor.exe 35 PID 2180 wrote to memory of 2948 2180 omsecor.exe 35 PID 2180 wrote to memory of 2948 2180 omsecor.exe 35 PID 2948 wrote to memory of 2900 2948 omsecor.exe 36 PID 2948 wrote to memory of 2900 2948 omsecor.exe 36 PID 2948 wrote to memory of 2900 2948 omsecor.exe 36 PID 2948 wrote to memory of 2900 2948 omsecor.exe 36 PID 2948 wrote to memory of 2900 2948 omsecor.exe 36 PID 2948 wrote to memory of 2900 2948 omsecor.exe 36 PID 2900 wrote to memory of 1252 2900 omsecor.exe 37 PID 2900 wrote to memory of 1252 2900 omsecor.exe 37 PID 2900 wrote to memory of 1252 2900 omsecor.exe 37 PID 2900 wrote to memory of 1252 2900 omsecor.exe 37 PID 1252 wrote to memory of 1760 1252 omsecor.exe 38 PID 1252 wrote to memory of 1760 1252 omsecor.exe 38 PID 1252 wrote to memory of 1760 1252 omsecor.exe 38 PID 1252 wrote to memory of 1760 1252 omsecor.exe 38 PID 1252 wrote to memory of 1760 1252 omsecor.exe 38 PID 1252 wrote to memory of 1760 1252 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe"C:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exeC:\Users\Admin\AppData\Local\Temp\25b03dceb4c2e0a33ab3d5bf765ff9914746fe41017fb5a5e9e025139d0fc1b0N.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1760
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5175ff8613e46b0ed394f0c289179cebf
SHA1f17a7e2b05febe8b28f6f6c74d9d8d2f39621599
SHA25691a72c6d342189658464e647acb222eeadbedb4e019ccc77d12947c27eac2c3f
SHA512d1104fef152d60d470ea7457ac1de592c848a7c33dce6729ea15f289eaf81bcffe8e7e514acfd2454ca5b3c1410d3a8e351caa472df3eaf4d32fbe7d2a5b31b7
-
Filesize
96KB
MD56db853a4d4afa37880a777e634fb61bc
SHA125a841a402f07cde8c12217e4639761786f77fae
SHA2568e98b3a58984404053b066f7b81c929c3e3b728e6a70dc5e6b59489ecad2e5d5
SHA512e134376c2305537b0fb1514dada99e6cb3544208011b383fa3556c9ac85064328159c04af8aee2a3db4d6eff9e144dc9819e592284732bec3110aa1af5eedef3
-
Filesize
96KB
MD5a2f01893d72aa8d9b87f5b55ab57c153
SHA1494feed376535c93db3f69d4ee078338a8430b47
SHA256624210172f5dd5c8c7acc038402c93b7d45b499b765fae5eba1156f4c8aaf278
SHA51280a230e6a98efdade26ad7fd5ea261ebd0b275bc5565e30949245cd2e92a18b0aef95e80771e57491b6d7d4fcd68a952970a103e3624bade99298c3feb21f997