Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 04:32
Static task
static1
Behavioral task
behavioral1
Sample
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
Resource
win7-20240903-en
General
-
Target
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
-
Size
134KB
-
MD5
dc35c9d2c141e65a01fed54e5f4b06fb
-
SHA1
87b929eb932881f275296c2c8c4bf456613a85bf
-
SHA256
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21
-
SHA512
878ce2e60ea0516fa51109eaf17b561499eb77c8e927c7ea5912a85f6e552aa3c0d75addaf27af5b20c89b7d812b4588076199a409b14c977c96724d71e9c997
-
SSDEEP
1536:XDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:ziRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2972 omsecor.exe 3048 omsecor.exe 1944 omsecor.exe 1076 omsecor.exe 2284 omsecor.exe 2600 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 1936 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 1936 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 2972 omsecor.exe 3048 omsecor.exe 3048 omsecor.exe 1076 omsecor.exe 1076 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2336 set thread context of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2972 set thread context of 3048 2972 omsecor.exe 33 PID 1944 set thread context of 1076 1944 omsecor.exe 36 PID 2284 set thread context of 2600 2284 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2336 wrote to memory of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2336 wrote to memory of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2336 wrote to memory of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2336 wrote to memory of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2336 wrote to memory of 1936 2336 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 1936 wrote to memory of 2972 1936 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 32 PID 1936 wrote to memory of 2972 1936 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 32 PID 1936 wrote to memory of 2972 1936 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 32 PID 1936 wrote to memory of 2972 1936 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 32 PID 2972 wrote to memory of 3048 2972 omsecor.exe 33 PID 2972 wrote to memory of 3048 2972 omsecor.exe 33 PID 2972 wrote to memory of 3048 2972 omsecor.exe 33 PID 2972 wrote to memory of 3048 2972 omsecor.exe 33 PID 2972 wrote to memory of 3048 2972 omsecor.exe 33 PID 2972 wrote to memory of 3048 2972 omsecor.exe 33 PID 3048 wrote to memory of 1944 3048 omsecor.exe 35 PID 3048 wrote to memory of 1944 3048 omsecor.exe 35 PID 3048 wrote to memory of 1944 3048 omsecor.exe 35 PID 3048 wrote to memory of 1944 3048 omsecor.exe 35 PID 1944 wrote to memory of 1076 1944 omsecor.exe 36 PID 1944 wrote to memory of 1076 1944 omsecor.exe 36 PID 1944 wrote to memory of 1076 1944 omsecor.exe 36 PID 1944 wrote to memory of 1076 1944 omsecor.exe 36 PID 1944 wrote to memory of 1076 1944 omsecor.exe 36 PID 1944 wrote to memory of 1076 1944 omsecor.exe 36 PID 1076 wrote to memory of 2284 1076 omsecor.exe 37 PID 1076 wrote to memory of 2284 1076 omsecor.exe 37 PID 1076 wrote to memory of 2284 1076 omsecor.exe 37 PID 1076 wrote to memory of 2284 1076 omsecor.exe 37 PID 2284 wrote to memory of 2600 2284 omsecor.exe 38 PID 2284 wrote to memory of 2600 2284 omsecor.exe 38 PID 2284 wrote to memory of 2600 2284 omsecor.exe 38 PID 2284 wrote to memory of 2600 2284 omsecor.exe 38 PID 2284 wrote to memory of 2600 2284 omsecor.exe 38 PID 2284 wrote to memory of 2600 2284 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exeC:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD52019304045626d7fb3b549ee493db083
SHA1b193f0ff08ab3c0b453b856ae9e1437f9536b247
SHA25615e7173a479d16baf8f393306d01ed69253712e264be71032ddbf8e1f3a7adc4
SHA5123fd5ba8ad2e71498125a58945d0027afec0752926d83adb6a0c3908f21f0902099c0da4cde3efd693afc19456466f5d8b1d41d02a23e0b60a675a473aebd8b60
-
Filesize
134KB
MD549b8123829698f11e555ae5048425e0b
SHA1428402cd1dcf90ed26f3158140919f08394d7db4
SHA2561e2cf852f7df330478d59b3a5a173714667c57016d47e84d581917bb0c2aa20b
SHA5127151b4e6d35169ff750703e0adbdead6aaca6cdd12ff92d1e702b470d07e958b5e652e490746d7c64c1b4b58863afc84f5bb437576a05d399b17f3d18ce14dd6
-
Filesize
134KB
MD529936d8337ee9f0e7460e1399c8e55cc
SHA12e0cbf79a5838fe8716103b4428647e286023be3
SHA2569f1e907570b1d681027d6aec5ea132e0907b9f4be940a682311c47854139bc2d
SHA512831d600dde7b6389b90ce8646ab32a170f82b27b0bb80d8e1db37c25f198c20feff8be59c78e0c130df058cc9955a0b3b8e309df1cdbc34f7c913e31a49551de