Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 04:38
Static task
static1
Behavioral task
behavioral1
Sample
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
Resource
win7-20241010-en
General
-
Target
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe
-
Size
134KB
-
MD5
dc35c9d2c141e65a01fed54e5f4b06fb
-
SHA1
87b929eb932881f275296c2c8c4bf456613a85bf
-
SHA256
93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21
-
SHA512
878ce2e60ea0516fa51109eaf17b561499eb77c8e927c7ea5912a85f6e552aa3c0d75addaf27af5b20c89b7d812b4588076199a409b14c977c96724d71e9c997
-
SSDEEP
1536:XDfDbhERTatPLTH0iqNZg3mqKv6y0RrwFd1tSEsF27da6ZW72Foj/MqMabadwCid:ziRTeH0iqAW6J6f1tqF6dngNmaZCiaI
Malware Config
Extracted
neconyd
http://ow5dirasuek.com/
http://mkkuei4kdsz.com/
http://lousta.net/
Signatures
-
Neconyd family
-
Executes dropped EXE 6 IoCs
pid Process 2600 omsecor.exe 320 omsecor.exe 3012 omsecor.exe 3004 omsecor.exe 1236 omsecor.exe 2540 omsecor.exe -
Loads dropped DLL 7 IoCs
pid Process 2124 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 2124 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 2600 omsecor.exe 320 omsecor.exe 320 omsecor.exe 3004 omsecor.exe 3004 omsecor.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\omsecor.exe omsecor.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2636 set thread context of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2600 set thread context of 320 2600 omsecor.exe 32 PID 3012 set thread context of 3004 3012 omsecor.exe 36 PID 1236 set thread context of 2540 1236 omsecor.exe 38 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language omsecor.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2636 wrote to memory of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2636 wrote to memory of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2636 wrote to memory of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2636 wrote to memory of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2636 wrote to memory of 2124 2636 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 30 PID 2124 wrote to memory of 2600 2124 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2124 wrote to memory of 2600 2124 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2124 wrote to memory of 2600 2124 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2124 wrote to memory of 2600 2124 93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe 31 PID 2600 wrote to memory of 320 2600 omsecor.exe 32 PID 2600 wrote to memory of 320 2600 omsecor.exe 32 PID 2600 wrote to memory of 320 2600 omsecor.exe 32 PID 2600 wrote to memory of 320 2600 omsecor.exe 32 PID 2600 wrote to memory of 320 2600 omsecor.exe 32 PID 2600 wrote to memory of 320 2600 omsecor.exe 32 PID 320 wrote to memory of 3012 320 omsecor.exe 35 PID 320 wrote to memory of 3012 320 omsecor.exe 35 PID 320 wrote to memory of 3012 320 omsecor.exe 35 PID 320 wrote to memory of 3012 320 omsecor.exe 35 PID 3012 wrote to memory of 3004 3012 omsecor.exe 36 PID 3012 wrote to memory of 3004 3012 omsecor.exe 36 PID 3012 wrote to memory of 3004 3012 omsecor.exe 36 PID 3012 wrote to memory of 3004 3012 omsecor.exe 36 PID 3012 wrote to memory of 3004 3012 omsecor.exe 36 PID 3012 wrote to memory of 3004 3012 omsecor.exe 36 PID 3004 wrote to memory of 1236 3004 omsecor.exe 37 PID 3004 wrote to memory of 1236 3004 omsecor.exe 37 PID 3004 wrote to memory of 1236 3004 omsecor.exe 37 PID 3004 wrote to memory of 1236 3004 omsecor.exe 37 PID 1236 wrote to memory of 2540 1236 omsecor.exe 38 PID 1236 wrote to memory of 2540 1236 omsecor.exe 38 PID 1236 wrote to memory of 2540 1236 omsecor.exe 38 PID 1236 wrote to memory of 2540 1236 omsecor.exe 38 PID 1236 wrote to memory of 2540 1236 omsecor.exe 38 PID 1236 wrote to memory of 2540 1236 omsecor.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exeC:\Users\Admin\AppData\Local\Temp\93599d935cd4e21bf1f113773ea735d90319140f27fdab3a2f8b7aa4774e8d21.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\System32\omsecor.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\omsecor.exeC:\Windows\SysWOW64\omsecor.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Roaming\omsecor.exeC:\Users\Admin\AppData\Roaming\omsecor.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD52019304045626d7fb3b549ee493db083
SHA1b193f0ff08ab3c0b453b856ae9e1437f9536b247
SHA25615e7173a479d16baf8f393306d01ed69253712e264be71032ddbf8e1f3a7adc4
SHA5123fd5ba8ad2e71498125a58945d0027afec0752926d83adb6a0c3908f21f0902099c0da4cde3efd693afc19456466f5d8b1d41d02a23e0b60a675a473aebd8b60
-
Filesize
134KB
MD513993c13be2349fcb4bab5bc8a9dc3ed
SHA1f93479ea1bfbf360d456ff98db6f5666684ad093
SHA2561df6fe42bd125336e6136527f7e5a078088ba7739a490f1781a9c766c3aa2f6f
SHA512112c66230a53f37cba0a440f463b92b7c1eed0888dbbf1251a1be2e7c1b22070df157165a604d4a1561c37465dc859300410ef0be408f299b2a62965cd956e8e
-
Filesize
134KB
MD56f1d1b4d151a377f96de5433f33ad9b4
SHA146859e6f39ea3b94c960cb5073315436f6c0a868
SHA256df6cb59e59e8717732a949e865ef1c50c196ec0290218791abdc346493ebdc73
SHA512a7eb1bff2cf4440291f18934811cdf3c4c1a5153b8cbb34d2852e5b117e015e7635384e2141cb67873cd6cc4dc23fe143af1ad4a645cbf7478fcec1b32f40ae8