Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 19:41
Static task
static1
Behavioral task
behavioral1
Sample
096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe
Resource
win7-20241010-en
General
-
Target
096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe
-
Size
96KB
-
MD5
c261a75f6c9f7a22d29f7d47424c9f1b
-
SHA1
0023b2369c66b591b01478264bb22e64cd5bb2be
-
SHA256
096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f
-
SHA512
9bd15e1b296a26bbbe60472958f0b3b7a8b70dbed81165b99b623d468213888d5bebcd838ed5ccac35feb3e9ecbe8d80a009d98b1fad7c370c02f32f7badfb12
-
SSDEEP
1536:PnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxL:PGs8cd8eXlYairZYqMddH13L
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2480 omsecor.exe 2892 omsecor.exe 1640 omsecor.exe 460 omsecor.exe 516 omsecor.exe 2408 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2496 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 2496 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 2480 omsecor.exe 2892 omsecor.exe 2892 omsecor.exe 460 omsecor.exe 460 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2208 set thread context of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2480 set thread context of 2892 2480 omsecor.exe 32 PID 1640 set thread context of 460 1640 omsecor.exe 35 PID 516 set thread context of 2408 516 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2208 wrote to memory of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2208 wrote to memory of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2208 wrote to memory of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2208 wrote to memory of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2208 wrote to memory of 2496 2208 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 30 PID 2496 wrote to memory of 2480 2496 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 31 PID 2496 wrote to memory of 2480 2496 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 31 PID 2496 wrote to memory of 2480 2496 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 31 PID 2496 wrote to memory of 2480 2496 096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe 31 PID 2480 wrote to memory of 2892 2480 omsecor.exe 32 PID 2480 wrote to memory of 2892 2480 omsecor.exe 32 PID 2480 wrote to memory of 2892 2480 omsecor.exe 32 PID 2480 wrote to memory of 2892 2480 omsecor.exe 32 PID 2480 wrote to memory of 2892 2480 omsecor.exe 32 PID 2480 wrote to memory of 2892 2480 omsecor.exe 32 PID 2892 wrote to memory of 1640 2892 omsecor.exe 34 PID 2892 wrote to memory of 1640 2892 omsecor.exe 34 PID 2892 wrote to memory of 1640 2892 omsecor.exe 34 PID 2892 wrote to memory of 1640 2892 omsecor.exe 34 PID 1640 wrote to memory of 460 1640 omsecor.exe 35 PID 1640 wrote to memory of 460 1640 omsecor.exe 35 PID 1640 wrote to memory of 460 1640 omsecor.exe 35 PID 1640 wrote to memory of 460 1640 omsecor.exe 35 PID 1640 wrote to memory of 460 1640 omsecor.exe 35 PID 1640 wrote to memory of 460 1640 omsecor.exe 35 PID 460 wrote to memory of 516 460 omsecor.exe 36 PID 460 wrote to memory of 516 460 omsecor.exe 36 PID 460 wrote to memory of 516 460 omsecor.exe 36 PID 460 wrote to memory of 516 460 omsecor.exe 36 PID 516 wrote to memory of 2408 516 omsecor.exe 37 PID 516 wrote to memory of 2408 516 omsecor.exe 37 PID 516 wrote to memory of 2408 516 omsecor.exe 37 PID 516 wrote to memory of 2408 516 omsecor.exe 37 PID 516 wrote to memory of 2408 516 omsecor.exe 37 PID 516 wrote to memory of 2408 516 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe"C:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exeC:\Users\Admin\AppData\Local\Temp\096fba76be1678c903c6989c1d8005b3accc36d0ab8668f98ed7c5ce161f994f.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53aaaf18fc1ad2a3688abd95952e4454f
SHA12d53d87b0433667e774902a0511d626220d7b421
SHA2561c31a9971a9b29d2ddd1bb88da8e0bece0b39a619e8763ef721a45de4749c384
SHA5124066d3fbfdea83ac5bea8a00127e22de82a31c9414237465db38258b2df74af7fe65f2b8cba83e50f200b6782f49bfe7efeee7abb523dec4cc8d91e281bf8e62
-
Filesize
96KB
MD5dab90aa322e45c57d85593a361fbbfee
SHA12215c750b7041dd1829ba7559f447ffb5ca7fecd
SHA25629e72d8f952412cda9f2fb196d5d9264c9590e7c07290b54f75bdf614e2a7808
SHA51284e27f1c182eff078186ffab0234219e4fbbcde3b96a9b6ec9b0e065c309ff123660df6af4daf3da5a059746611f1059e40482ad73eea3914ad884422f5ac507
-
Filesize
96KB
MD5c125632c06ea92c275ffb6fa57cf0ea2
SHA11a2a2ce1419cc8cdb33c100598466275ee1b5fb8
SHA256711456033c95c688c954be3c29b09b5ec96481cc8a85a95a9809022171d9729b
SHA512a6a19e4a231f14c76398737b8a59cda89f9fb220968c34910da40aa9c262130e921f58661dc4933c1aa311bc945a466e93100c5bf5ff11a1bdaa7a625bc45952