Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 05:00
Static task
static1
Behavioral task
behavioral1
Sample
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
Resource
win7-20240903-en
General
-
Target
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe
-
Size
96KB
-
MD5
78218d41fd66e7e6cadd47af577f71e1
-
SHA1
aa8a7ded8287b189a1a6cf82fbce6f71b6bcd688
-
SHA256
bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88
-
SHA512
7ec64b25ef5db3a3070b663c4f46b87daa54a54624ceeda1644e09e8ba6cec2c45c7d7d02920d522ff8c1dadcc11e127f7eb4aecc9c03c1e1e182dd3e02539a3
-
SSDEEP
1536:znAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxr:zGs8cd8eXlYairZYqMddH13r
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 1068 omsecor.exe 2008 omsecor.exe 1568 omsecor.exe 1896 omsecor.exe 1968 omsecor.exe 2944 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2060 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 2060 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 1068 omsecor.exe 2008 omsecor.exe 2008 omsecor.exe 1896 omsecor.exe 1896 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2396 set thread context of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 1068 set thread context of 2008 1068 omsecor.exe 32 PID 1568 set thread context of 1896 1568 omsecor.exe 36 PID 1968 set thread context of 2944 1968 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 2396 wrote to memory of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 2396 wrote to memory of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 2396 wrote to memory of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 2396 wrote to memory of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 2396 wrote to memory of 2060 2396 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 30 PID 2060 wrote to memory of 1068 2060 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 31 PID 2060 wrote to memory of 1068 2060 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 31 PID 2060 wrote to memory of 1068 2060 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 31 PID 2060 wrote to memory of 1068 2060 bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe 31 PID 1068 wrote to memory of 2008 1068 omsecor.exe 32 PID 1068 wrote to memory of 2008 1068 omsecor.exe 32 PID 1068 wrote to memory of 2008 1068 omsecor.exe 32 PID 1068 wrote to memory of 2008 1068 omsecor.exe 32 PID 1068 wrote to memory of 2008 1068 omsecor.exe 32 PID 1068 wrote to memory of 2008 1068 omsecor.exe 32 PID 2008 wrote to memory of 1568 2008 omsecor.exe 35 PID 2008 wrote to memory of 1568 2008 omsecor.exe 35 PID 2008 wrote to memory of 1568 2008 omsecor.exe 35 PID 2008 wrote to memory of 1568 2008 omsecor.exe 35 PID 1568 wrote to memory of 1896 1568 omsecor.exe 36 PID 1568 wrote to memory of 1896 1568 omsecor.exe 36 PID 1568 wrote to memory of 1896 1568 omsecor.exe 36 PID 1568 wrote to memory of 1896 1568 omsecor.exe 36 PID 1568 wrote to memory of 1896 1568 omsecor.exe 36 PID 1568 wrote to memory of 1896 1568 omsecor.exe 36 PID 1896 wrote to memory of 1968 1896 omsecor.exe 37 PID 1896 wrote to memory of 1968 1896 omsecor.exe 37 PID 1896 wrote to memory of 1968 1896 omsecor.exe 37 PID 1896 wrote to memory of 1968 1896 omsecor.exe 37 PID 1968 wrote to memory of 2944 1968 omsecor.exe 38 PID 1968 wrote to memory of 2944 1968 omsecor.exe 38 PID 1968 wrote to memory of 2944 1968 omsecor.exe 38 PID 1968 wrote to memory of 2944 1968 omsecor.exe 38 PID 1968 wrote to memory of 2944 1968 omsecor.exe 38 PID 1968 wrote to memory of 2944 1968 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exeC:\Users\Admin\AppData\Local\Temp\bfc407eea9c173b06eb05a1ac70f561efcc924eff26d4564d48cce337334cf88.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5eec076cdc82f43b08d721f79500c8074
SHA19a6a6d9faef3e11b970f4e14c47f84384c36fafc
SHA2563041bd8a974b30bc48fe113ea23488d0a1fdaadaf2a95bbfd9fb0e4c6c97c7e5
SHA51233f5c6fbeb43e7554c430a539bed59c6c763cd9106bc31e6d80414c11a1404f2b10514828073ad8233f4070b6766c9636b929fbc72dfab6561a2bd975c114a56
-
Filesize
96KB
MD50b462464bd7de6a17b7b2f54feb7fb39
SHA1c2436af62291aef7210a6acc9acc9a7359c6d82b
SHA256544560c4cb53d759607eb3db14a89525e9f05bb3bcb1d47063f8261b5a2732a2
SHA5122ff0563719e57458adc399057aef4803076cf3c5428dcf5076b840b3b8d10a3ff03da5a2c5787904db66b3f1cfde066fd72e054d7da43515c6642497643cb340
-
Filesize
96KB
MD5760dcd543bc76f45505418510dbb20d4
SHA120d42774bade8fa97f0340f6cefea1e95002a7a5
SHA256d74ed9aa8028b66f009ce009923a8b4a71a987976881e06ed65fe6671ddf95d2
SHA512074c8a90e8c1e409c1c42aa41a61a659bc2b33423a598e32c673556fca16a2e02f6cc62c9bf4db5380624c651f163ed273445083cf48deaf5484e2e3f6296f6e