Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 09:24
Static task
static1
Behavioral task
behavioral1
Sample
d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe
Resource
win7-20241010-en
General
-
Target
d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe
-
Size
96KB
-
MD5
471f49e3fe485b7ed02e5a754744f855
-
SHA1
23b95ccf3e5a579680dad54f63148b1a66d7a0f4
-
SHA256
d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636
-
SHA512
bba8483e9704f18381404d1ea94899277bb0c9a5c1dd90725655582674c54d3811b4c4504356611e699c36274d0b75c4e0742b003b65af7126eb840894a041ef
-
SSDEEP
1536:vnAHcBbLmdvduLd8IDiaP/8A68YaiIv2RwEYqlwi+BzdAeV9b5ADbyxxx:vGs8cd8eXlYairZYqMddH13x
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 3056 omsecor.exe 2280 omsecor.exe 604 omsecor.exe 1680 omsecor.exe 1672 omsecor.exe 1444 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1964 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 1964 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 3056 omsecor.exe 2280 omsecor.exe 2280 omsecor.exe 1680 omsecor.exe 1680 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1572 set thread context of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 3056 set thread context of 2280 3056 omsecor.exe 30 PID 604 set thread context of 1680 604 omsecor.exe 35 PID 1672 set thread context of 1444 1672 omsecor.exe 37 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 1572 wrote to memory of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 1572 wrote to memory of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 1572 wrote to memory of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 1572 wrote to memory of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 1572 wrote to memory of 1964 1572 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 28 PID 1964 wrote to memory of 3056 1964 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 29 PID 1964 wrote to memory of 3056 1964 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 29 PID 1964 wrote to memory of 3056 1964 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 29 PID 1964 wrote to memory of 3056 1964 d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe 29 PID 3056 wrote to memory of 2280 3056 omsecor.exe 30 PID 3056 wrote to memory of 2280 3056 omsecor.exe 30 PID 3056 wrote to memory of 2280 3056 omsecor.exe 30 PID 3056 wrote to memory of 2280 3056 omsecor.exe 30 PID 3056 wrote to memory of 2280 3056 omsecor.exe 30 PID 3056 wrote to memory of 2280 3056 omsecor.exe 30 PID 2280 wrote to memory of 604 2280 omsecor.exe 34 PID 2280 wrote to memory of 604 2280 omsecor.exe 34 PID 2280 wrote to memory of 604 2280 omsecor.exe 34 PID 2280 wrote to memory of 604 2280 omsecor.exe 34 PID 604 wrote to memory of 1680 604 omsecor.exe 35 PID 604 wrote to memory of 1680 604 omsecor.exe 35 PID 604 wrote to memory of 1680 604 omsecor.exe 35 PID 604 wrote to memory of 1680 604 omsecor.exe 35 PID 604 wrote to memory of 1680 604 omsecor.exe 35 PID 604 wrote to memory of 1680 604 omsecor.exe 35 PID 1680 wrote to memory of 1672 1680 omsecor.exe 36 PID 1680 wrote to memory of 1672 1680 omsecor.exe 36 PID 1680 wrote to memory of 1672 1680 omsecor.exe 36 PID 1680 wrote to memory of 1672 1680 omsecor.exe 36 PID 1672 wrote to memory of 1444 1672 omsecor.exe 37 PID 1672 wrote to memory of 1444 1672 omsecor.exe 37 PID 1672 wrote to memory of 1444 1672 omsecor.exe 37 PID 1672 wrote to memory of 1444 1672 omsecor.exe 37 PID 1672 wrote to memory of 1444 1672 omsecor.exe 37 PID 1672 wrote to memory of 1444 1672 omsecor.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe"C:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exeC:\Users\Admin\AppData\Local\Temp\d250b89085e8576f4e882ef4f376d8c7a2226dc451ccd2ec73e57b924edea636.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5ca5473505aee2ebe76824260fb993d53
SHA10eade2fe67b31f7ef7878e6bc2ae0803b907cb3e
SHA256a607d8bb3600b1be3af91054a8329ecd5840e02103b72b8e895aff77a99a3f7c
SHA512c2deea8ca874e88059c8bd4d409bf5520da82eb30f8876e8edcf694d52d89eba0967ce8eb5fe906cb8b18aff779c653601dbc40de658f7702500b9016f810b97
-
Filesize
96KB
MD5360afbeffe97a9309e1320f9eddbede8
SHA100c3e46a0a7c5728718202b98a4948d527d50c48
SHA256af6d0512fbf3626a43f658dfe7713a950c80d2d8c08b03153d187b67d310a660
SHA5125cddfb2fe637e6b1900a17638ea54063773144abbd7a75c6ea7b9ec20d949744d646defb788ddc6c7591078a29fde87856e334bd7f5bd4aa3e959d6680f47d27
-
Filesize
96KB
MD58171e70e1e19106ec58d84ab85405439
SHA1b3309435045ee3be8832e9b1cf24a238455716b2
SHA2567281c2a70398d3ecd114f7dad396371ea6eb95fca2da8dc572609e33708ea03d
SHA512230b21bfcabdde21982f09815e0e6e34596dec3de592df76df2e86f512cbc5821bfedbb0a7333256e8abfc8b6d57d6966f9998c513f871700d8cf10758004f52